DOC PREVIEW
SJSU CS 265 - TWO MICROPAYMENT SCHEMES

This preview shows page 1-2-3-4 out of 11 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PowerPoint PresentationINTRODUCTIONCharacters of MicropaymentPayword - AlgorithmPayword - AdvantagesPayword - DisadvantagesMicroMint – Algorithm IMicroMint – Algorithm IIMicroMint – AdvantagesMicroMint – DisadvantagesProperties of a good MicropaymentPAYWORD, MICROMINT-TWO MICROPAYMENT SCHEMESPROJECT OF CS 265SPRING, 2004WRITTEN BY JIAN DAIINTRODUCTION•Micropayments were introduced when Internet boomed in 1990’s •Many Micropayment implements have failed with the burst of Internet bubble.•It get attention again recently with the change of economic environmentCharacters of Micropayment•The amount of each transaction is very small•The efficiency and low cost of transaction are extremely important. •The relation between the payer and payee intends to be transient•The security of transaction can be comprised a little in order to achieve the efficiency and reduce costPayword - Algorithm•Credit-based schema. User needs to get a certificate from broker first•User use a hash function to create payword chain in reverse order based on certificate•The public hash function: wi = h(wi+1) •The payword chain is user and vendor specific.•User needs to send certificate and the root of the payword chain to vendor at the beginning of payment.•The user user the chain in order. Based on the last payword wl received, the vendor can decide the total payment. •The vendor submit the payword received and get redeem from broker at the end of the dayPayword - Advantages•Can prevent forgery and double spending •Use off-line schema to minimize communication with broker•Do not need to sign every payment and can reduce the public key operation dramatically. •It is specially good if a user pay a special vendor many times a day•The relationship between user and vendor is transientPayword - Disadvantages•The user must set up an account with a broker. The relationship between them is long-term•Still need public key operation•Not very good in the scenario that a user needs to pay many vendors. •The vendors must adopt brokers’ protocols. There exists a bond between vendors and brokersMicroMint – Algorithm I•The broker use so-called “k-way hash collisions” to produce coin. Each coin has the property that they will have the same hash result under a special hash function.•It is very difficult to find the first “hash collisions” result. After then, the growth rate of the number of such results will be exponential. So the unit cost of each coin for broker is low when the broker make high volume of coins.•On the other hand, the unit cost will be too high to worth for a hacker to try.•Over the time, the coin will become more and more vulnerable to attack. Therefore, the coins need to be changed from time to time.MicroMint – Algorithm II•A user buy coins from broker.•Then, the user buy contents from an vendor with coins.•The vendor collect the coins and get redeem from broker at the end of the day.•The broker needs to trace the users’ records in order to prevent the “double-spending”•The broker also need to replaced the unused coins with the new coins at the end of the monthMicroMint – Advantages•Not public key operation at all.•Can prevent forgery and double-spending effectively•Broker is off-line•The hash function and criteria are public. The vendor can verify coins easily.MicroMint – Disadvantages•Need big one-time investment and need high demand for coin•Broker need to keep users’ records to prevent “double spending”•The security is not guaranteed because it is based on some assumptions•The coins need to be changed from time to time.Properties of a good Micropayment•Good Transaction Security. The system should be able to prevent from any forging•Low Cost. The total security operation cost and transaction cost should be very low•Anonymous. Ideally, the relationship between vendor and user is transient. A vendor can work with any broker, and vice versa.•Easy to use. The transaction should be very efficient. Ideally, it should be an “one-click”


View Full Document

SJSU CS 265 - TWO MICROPAYMENT SCHEMES

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download TWO MICROPAYMENT SCHEMES
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view TWO MICROPAYMENT SCHEMES and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view TWO MICROPAYMENT SCHEMES 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?