Improving the Secure Electronic Transaction Protocol by Using Signcryption
スポンサーリンク
概要
- 論文の詳細を見る
In the past few years, we have seen the emergence of a large number of proposals for electronic payments over open networks. Among these proposals is the Secure Electronic Transaction (SET) protocol promoted by MasterCard and VISA which is currently being deployed world-widely. While SET has a number of advantages over other proposals in terms of simplicity and openness, there seems to be a consensus regarding the relative inefficiency of the protocol. This paper proposes a light-weight version of the SET protocol, called "LITESET." For the same level of security as recommended in the latest version of SET specifications, LITESET yields a 56.2/51.4% reduction in the computational time in message generation/verification and a 79.9% reduction in communication overhead. This has been achieved by the use of a new cryptographic primitive called signcryption. We hope that our proposal can contribute to the practical and engineering side of real-world electronic payments.
- 社団法人電子情報通信学会の論文
- 2001-08-01
著者
-
Zheng Y
Univ. North Carolina Charlotte Nc Usa
-
Zheng Yuliang
Department Of Software And Information Systems
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
IMAI Hideki
The author is with Institute of Industrial Sience, the University of Tokyo
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
HANAOKA Goichiro
The authors are with the 3rd Department, Institute of Industrial Science the University of Tokyo
-
ZHENG Yuliang
The author is with the School of Network Computing, Monash University
関連論文
- 非超特異楕円曲線に対するMOVアルゴリズムの実現(2)
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Unconditionally Secure Chaffing-and-Winnowing
- The MAC-based Construction of Strong Multiple Encryption
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Towards Removing Random Oracles from OAEP
- On Strictly Geometrically Uniform Codes: Construction and New Codes
- 情報量的安全性に基づく暗号化方式について
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On Evaluating the Entropy of Graphical Passwords
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- Hierarchical Coding Based on Multilevel Bit-Interleaved Channeles
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Efficient Provider Authentication for Bidirectional Broadcasting Service
- A Trade-off Traitor Tracing Scheme
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks(Special Issue on Next Generation Internet Technologies and Their Applications)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- An Image Correction Scheme for Video Watermarking Extraction : Special Section on Cryptography and Information Security
- Development of Cryptology in the Nineties : Special Section on the 10th Anniversary of Trans. Fundamentals : Last Decade and 21st Century
- Secure Broadcast System with Simultaneous Individual Messaging