MiMi: A Java Implementation of the MicroMint Scheme
نویسندگان
چکیده
In this paper we describe an experimental implementation of the MicroMint micropayment scheme in Java. We apply this scheme to purchasing Web pages. A prerequisite was to accomplish this without having to change the code of either the Web server or the Web client. We discuss the implementation issues and security considerations. Our implementation requires the local protocol handler feature offered by Sun Microsystems’ HotJava 1.0 browser.
منابع مشابه
A Preliminary Outline of a Proposed Micromint Design Specification∗
This manuscript contains a preliminary outline of a proposed design specification for the hashing chip from the Micromint micropayment scheme due to Rivest and Shamir [2]. The goal of the manuscript is to specify some of the actual parameters and design choices necessary to build a Micromint chip, and then to analyze the resulting construction.
متن کاملVulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme
Rivest and Shamir presented two simple micropayment schemes, “PayWord” and “MicroMint,” for making small purchases over the Internet [14]. Recently, Adachi et al. have pointed out that the PayWord scheme has two security problems, and proposed a new micropayment scheme to overcome these problems [1]. Nevertheless, we show that their protocol is still vulnerable to impersonation and replay attacks.
متن کاملSILK - a playful blend of Scheme and Java
SILK (Scheme in about 50 K) is a compact Scheme implemented in Java. It is currently in its fourth implementation. The first version implemented a nearly R4RS Scheme in Java, but its access to Java was awkward. The current version has altered SILK’s syntax and semantics slightly to better integrate with Java. This has simplified its implementation, and made SILK an effective Java scripting lang...
متن کاملThe Politico-Economic Challenges of Ghana’s National Health Insurance Scheme Implementation
Background National/social health insurance schemes have increasingly been seen in many low- and middle-income countries (LMICs) as a vehicle to universal health coverage (UHC) and a viable alternative funding mechanism for the health sector. Several countries, including Ghana, have thus introduced and implemented mandatory national health insurance schemes (NHIS) as part of reform efforts towa...
متن کاملResearch and Implementation of ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device
IST is abbreviated from ID-based encryption scheme based on symmetric-key technique with a trusted device. IST scheme is differ from conventional security technical theory by unifying authentication and powerful encryption. In this scheme, users can encrypt their file by using identity information, and exchange any key is not necessary. The aim of this paper is to implement an IST scheme by usi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997