A Secure, Cheap, Scalable and Exportable/importable Method for Internet Electronic Payments
نویسنده
چکیده
We propose cryptographic protocols for electronic payment transactions over the Internet. Three essential requirements are met. (1) Security: this consists of entity authentication of each party involved, message integrity protection, strong non-repudiation on payment order and high degree of fault tolerance. (2) Economy: a payment transaction will be completed with the involvement of the conventional parties, i.e., the client, the merchant and the nancial institution; the method does not employ any other specialised services, such as public-key certifying or Kerberos-like authen-tication. (3) International compatibility: no decryption algorithm will be used for secret retrieval; no non-exportable/non-importable cryptographic technology will be applied; thus, the method will be acceptable by the governments of various nations and can be scaled up to run in numerous nancial institutions. The method uses one-way hashed values of passwords which are centrally stored in nancial institutions. Being unable to nd the clear passwords allows nancial institutions to qualify as authentication agents.
منابع مشابه
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملElectronic Payment Systems
As business is moving from face-to-face trading, mail order, and telephone order to electronic commerce over open networks such as the Internet, crucial security issues are being raised. Whereas Electronic Funds Transfer over financial networks is reasonably secure, securing payments over open networks connecting commercial servers and consumer workstations poses challenges of a new dimension. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995