PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Protokół mikropłatności i makropłatności w sieciach bezprzewodowych

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
EN
Micropayment and macropayment protocol in wireless networks
Języki publikacji
PL
Abstrakty
PL
W artykule przedstawiono propozycje protokołu płatności w sieciach bezprzewodowych. Protokól zakłada dwie techniki realizacji transakcj i: w trybie on-line z udziałem zaufanej strony - dla tzw. makropłatności oraz w trybie off-line przy użyciu elektronicznego pieniądza, głównie dla transakcji o małym nominale - tzw. mikropłatności. Omówiono scenariusze różnych zdarzeń i transakcji w protokole. Zwrócono uwagę na aspekty bezpieczeństwa płatności uwzględniając techniki kryptografii asymetrycznej i infrastruktury kluczy publicznych. Dla oceny protokołu wykonano testy, w których uwzględniono kryteria charakterystyczne dla środowiska bezprzewodowego.
EN
The article proposes a payment protocol in wireless network. The protocol assumes two techniques of transaction realisation with the division between on-line payments with a trust third party - for macropayments and transactions in the off-line mode with the use of electronic money, mainly for transactions of small denomination - the so-called micropayments. Various events and transactions in the protocol as well as the scope of information and annoucements required for them are presented. An asymmetric cryptography and a public key infrastructure are exploited to provide payment security. In order to define quality of the protocol under regard of the characteristic criteria for a wireless environment were carried out its examinations. Usefulness of the payment protocol was evaluated using various measures. The best system has to demon-strate friendly properties for its users. An introduced model fulfils these expectations by delivering possibility of transactions of large amounts as well as of micropayments. Thanks to the use of digital cash transfer a user gets confidentiality. This makes the procedure simpler and a user does not absorb processor on a card through complicated and time-consuming cryptographic procedures. One of the objectives in designing the protocol was to minimize quantity of data exchanged to meet requirements of wireless networks. Due to this a user can execute payment operations in a fast and cheap way. The desired properties of encryption and decryption are obtained by applying the elliptic curves cryptography (ECC). It was confirmed by researches and tests and why it one was used in our protocol.
Rocznik
Strony
109--130
Opis fizyczny
Bibliogr. 23 poz., rys., tab.
Twórcy
  • Politechnika Warszawska, Instytut Radioelektroniki, ul. Nowowiejska 15/19, 00-665 Warszawa
  • Politechnika Warszawska, Instytut Radioelektroniki, ul. Nowowiejska 15/19, 00-665 Warszawa
Bibliografia
  • 1. D . C haum: Blind Signatures Untraceable Payments. Advances Cryptology, Proceeding of Crypto'82, N.Y.
  • 2. D. Chaum, den Boer, van Heyst, S. Mjolsnes, A. Steenbeek: Efficient Offline Electronic Checks. Proceedings of Eurocrypt '89, 1990, pp. 294-301.
  • 3. S. Brands: Untraceable Off-line Cash in Wallets with Observers. Crypto'93, pp. 302-318.
  • 4. S. Brands: Off-line Electronic Cash Based on Secret-Key Certificates. Proceedings of LATIN'95, 1995.
  • 5. D. Chaum: Online Cash Checks. Proceedings of Eurocrypt '89, 1990, pp. 288-293.
  • 6. G. Horn, H. J. Hitz: ASPeCT Advanced Security for Personal Communications Technologies. Evaluating Report, June 1997.
  • 7. G. Horn, B. Preneel: Authentication and Payment in Future Mobile Systems. Computer Security - ESORICS '98 Proccedings, Lecture Notes in Computer Science vol. 1485, Springer-Verlag, Berlin, 1998, pp. 277-293.
  • 8. K. M. Martin, et al: Secure Billing for Mobile lnformation Services in UMTS. Proceeding of ISEN, 1998.
  • 9. L. Pesonen: A Comparison of Chaum's and Brand's Electronic Cash Schemes. Tik-110.501, Seminar on Network Security, Department of Computer Science and Engineering, Helsinki University of Technology, 2000.
  • 10. M. Peirce, D. O'Mahony: Multi-Party Payments for Mobile Services. Technical Report TCD-CS-1999-48, Department of Computer Science, Trinity College Dublin, lreland, September 1999.
  • 11. K. Wrona, G. Zavagli: Adaptation of the SET Protocol to Mobile Networks and to the Wireless Application Protocol. Ericsson Eurolab Deutschland Herzogenrath, 1998.
  • 12. Q. Deng: Mobile Payments in Advanced Seminar: Electronic Payments Systems, July 2001.
  • 13. T. Jokinen: Digital Signatures in Mobile Commerce. Helsinki University of Technology, November 2000.
  • 14. J. F. Hampe, P. M. C. Swatman, P. A. Swatman: Electronic Commerce: The End of the Beginning. Proc. of 13th lnternational Bled Electronic Commerce Conference, June 2000.
  • 15. S. Brands: Electronic Cash in the Internet. Proceeding of International Society Symposium, California, 1995.
  • 16. N. Ferguson: Single of Thermae Off-Line Coins. Proceeding of Eurocrypt '93.
  • 17. D. Blinitas, E. Mazuk: Digital Cash, and Electronic Commerce. 1997.
  • 18. A. Menezes, P. Van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC Press, 1996.
  • 19. B. Schneier: Applied Cryptography. J. W & S, 1996.
  • 20. T. Okamoto: Provably Secure and Practical ldentification Schemes and Corresponding Signature Schemes. Proceeding of Crypto '92, Springer Verlag, 1992.
  • 21. E. D. Win, B. Preneel: Elliptic Curve Public Key Cryptosystems - an Introduction. Katholieke Universiteit Leuven.
  • 22. K. Ko, S. Lee, J. Cheon: New Public-key Cryptosystem Using Braid Groups. Korea Advanced Institute of Science and Technology, Taejon, Korea.
  • 23. The NTRU Public Key Cryptosystem: Operating Characteristics and Comparison with RSA, ElGamal, and ECC Cryptosystems. www.ntru.com.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BWA1-0005-0064
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.