mPAY : A New MicroPayment System

mPay : 초소액 지불시스템

  • Sin, Jun-Beom (Dept. of Electronic Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Lee, Gwang-Hyeong (Dept. of Electronic Computer Science, Korea Advanced Institute of Science and Technology)
  • 신준범 (한국과학기술원 전자전산학과) ;
  • 이광형 (한국과학기술원 전자전산학과)
  • Published : 2000.09.01

Abstract

본 논문에서는 효율성, 안전성 및 이중사용방지 요구 조건을 만족하면서 동시에 시스템 사용과정에서 생길 수 있는 여러 분쟁 유형에 대해서 효과적으로 대처할 수 있는 초소액 지불시스템을 제안한다. 이를 위하여 기존의 시스템들이 효율성 향상을 위해 많이 사용해 온 S/KEY 방식의 해쉬 체인을 변형한 이중 해쉬체인 구조를 제안한다. 제안 시스템인 mPay-1, mPay-2는 이 구조를 기반으로 하였으며 안전성 및 분쟁해결성 측면에서 좋은 결과를 보인다. mPay-1은 기존의 시스템과 동일한 효율성을 갖으나 보다 안전하다. mPay-1의 확장형인 mPay-2는 추가적으로 여러 분쟁 유형들에 대해 효과적으로 대처할 수 있다.

Keywords

References

  1. N. Asokan, P. Janson, M. Steiner and M. Waidner, State of the Art in Electronic Payment Systems, IEEE Computer Magazine, September, v. 30, n. 9, pp. 28-35, 1997 https://doi.org/10.1109/2.612244
  2. A. Herzberg, Safeguarding Digital Library Contents, D-Lib Magazine, January, 1998, ISDN 1082-9873
  3. Micro-Payments based on iKP, Ralf Hauser, Michael Steiner and Michael Waidner, IBM Research, 12 February 1996, Research Report 2791 (\# 89269), presented at SECURICOM96
  4. R. Anderson, C. Manifavas and C. Sutherland, NetCard - A Practical Electronic Cash System, Proc. Security Protocol Workshop, LNCS. 1189, pp. 49-57, 1997
  5. R.L. Rivest and A. Shamir, PayWord and MicroMint--Two Simple Micropayment Schemes, presented at RSA Security conference, 1996
  6. T. Pederson, Electronic Payments for Small Amounts, Proc. Security Protocol Workshop, LNCS. 1189, pp. 59-68, 1997
  7. Phillip M. Hallam-Baker, Micro Payment Transfer Protocol(MPTP), W3C Working Draft WD-mptp-951122 (22-Nov-95). at http://www.w3.org/TR/WD-mptp
  8. Cliff Newman and G. Medvinsky, Requirements for Network Payment: the Netcheque Perspective, Proc. of the IEEE Compcon'95, March 1995 https://doi.org/10.1109/CMPCON.1995.512360
  9. S. Classman, M. Manasse, M. Abadi, P. Gauthier, and P. Sobalvarro, The Millicent Protocol for Inexpensive Electronic Commerce. In World Wide Web Journal, Fourth International World Wide Web Conference Proceedings, pages 603-618. O'Reilly, December 1995
  10. Benjamin Cox, J. D. Tygar and Marvin Sirbu, NetBill Security and Transaction Protocol, in Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
  11. Amir Herzberg and Hilik Yochai, Mini-Pay : Charging per Click on the Web, IBM Research. at http://www.hrl.il.ibm.com/mpay/docs/papers/mpay
  12. N. M. Haller. The S/KEY one-time password system, In ISOC, 1994
  13. You are interested in: Electronic commerce, payment systems, and security, at http://www.semper.org/sirene/outsideworld/ecommerce.html
  14. Digicash homepage at http://www.digicash.com
  15. G. Medvinsky and C. Newman, NetCash: A design for practical electronic currency on the internet, Proceedings of the First Annual Conference on Computer and Communications Security, 1993
  16. Secure Electronic Transactions, MasterCard and VISA, at http://www.mastercard.com/set/
  17. M. Bellare, J.A. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, M. Waidner, iKP - A Family of Secure Electronic Payment Protocols, 1st USENIX Workshop on Electronic Commerce, 1995
  18. R. L. Rivest, A. Shamir and L. M. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Communications of the ACM, v. 21, n. 2, pp. 120-126, Feb. 1978 https://doi.org/10.1145/359340.359342
  19. National Institute for Standard and Technology(NIST), Digital Signature Standard (DSS), FIPS 186, Nov 1994
  20. Public Key Infrastructure(X.509), at http://www.ietf.org/html.charters/pkix-charter.html
  21. PGP(Pretty Good Privacy) http://thegate.gamers.org/~tony/pgp.html
  22. B. Schneier, Applied Cryptography(Second Edition), John Wiley & Sons, 1996
  23. A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
  24. National Institute for Standard and Technology (NIST), Secure Hash Standard (SHS), FIPS 180-1, Apr. 1995
  25. R. L. Rivest, The MD5 message-digest algorithm. Internet Request for Comments, RFC 1321, Apr. 1992
  26. M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Advances in Cryptology - CRYPTO' 96, LNCS 1109, 1996
  27. L. Lamport, Password Authentication with Insecure Communication, CACM, v. 24, n.11. pp. 770-772, 1981 https://doi.org/10.1145/358790.358797
  28. M. Burrows, M. Abadi, and R. Needham, A logic of Authentication, DEC SRC report #39, Digital Equipment Cooperation, Palo Alto, CA. Feb. 1989. Revised Feb.1990
  29. D. Tygar, Atomicity in Electronic Commerce. In Internet Besieged. Addison-Wesley and ACM Press. October 1997, pages 389-406
  30. R. Kailar, Accountability in Electronic Commerce Protocols, IEEE.Transactions on Software Engineering, v. 22, n. 5, pp. 313-328, 1996 https://doi.org/10.1109/32.502224
  31. N. Asokan, E. Van Herreweghen, and M. Steiner. Towards a framework for handling disputes in payment systems. Research Report RZ 2996, IBM Research, March 1998
  32. A. O. Freier, P. Karlton, and P. C. Kocher, The SSL Protocol Ver. 3.0, Netscape Communication Corporation. March 1996
  33. T. Dierks and C. Allen, The tls protocol version 1.0, RFC 2246, January 1999
  34. Seong-Min Hong, Jun-Bum Shin, H.Lee-Kwang and Hyunsoo Yoon, 'A new approach to server-aided secret computation', International Conference on Information Security and cryptology, Seoul, 1998
  35. E. F. Brickell, D. M. Gordon, K. S. Mccurley, and D. B. Wilson, 'Fast exponentiation with precomputation', Advances in Cryptography - EUROCRYPT'92(LNCS 658), pp. 200-207, 1993
  36. J. G. Steiner, B. C. Newman, and J. I. Schiller.Kerberos: An authentication service for open network systems, Proceedings of the Winter 1988 Usenix Conference, 1988, pages 191-201
  37. T. Okamoto and K. Ohta, Universal Electronic Cash. In Advances in Cryptology-Crypto'91, pages 324-337. Springer-Verlag, 1992
  38. T. Eng and T. Okamoto, Single-Term Divisible Electronic Coins, in Pre-Proceedings of Eurocrypt'94, pages 313-323. Springer-Verlag, 1994 https://doi.org/10.1007/BFb0053446
  39. T. Okamoto, An Efficient Divisible Electronic Cash Scheme, in Advances in Cryptology-Crypto'95, pages 438- 451. Springer-Verlag, 1995
  40. D. Chaum, A. Fiat, and M. Noar. Untraceable Electronic Cash, In Advances in Cryptology-Crypto'88, pages 319-327. Springer-Verlag,1990