Anonymous off-line micro-payment protocol with double spending prevention

碩士 === 國立政治大學 === 資訊科學學系 === 105 === As the coverage of mobile phone has been constantly increased in recent years, the mobile phones have become an indispensable tool in life. Many ways of lives are gradually done through the mobile terminals, for example: No longer need to find the way through the...

Full description

Bibliographic Details
Main Author: 林承毅
Other Authors: Tso, Ray Lin
Format: Others
Language:en_US
Online Access:http://ndltd.ncl.edu.tw/handle/5zmvrf
id ndltd-TW-105NCCU5394004
record_format oai_dc
spelling ndltd-TW-105NCCU53940042019-05-15T23:16:31Z http://ndltd.ncl.edu.tw/handle/5zmvrf Anonymous off-line micro-payment protocol with double spending prevention 可預防雙重支付的離線小額匿名交易機制 林承毅 碩士 國立政治大學 資訊科學學系 105 As the coverage of mobile phone has been constantly increased in recent years, the mobile phones have become an indispensable tool in life. Many ways of lives are gradually done through the mobile terminals, for example: No longer need to find the way through the map or search information through the computer, people have also gradually turned to electronic payment via e-wallets instead of paying via physical wallets, such as AliPay in China. Adopting the mobile phone as a wallet is nowadays the main development direction of mobile phones. Meanwhile, people are paying more and more attention to the topics on the security of mobile payment than before. In recent years, under the protection of secure element, the security of users’ mobile phone has been enhanced to a certain extent. In the case of off-line transactions, malicious users are capable of fooling secure element and making double spending. In 2016, Chen et al. proposed a NFC-Based anonymous mobile payment protocol. In that protocol the transaction can only be executed with the involvement of issuer. In this research, we introduce a new protocol which can support both on-line and off-line transactions. Our protocol is modified from that of Chen et al.’s idea. In our protocol, to prevent a malicious user, we use a secure element which stores sensitive information that cannot be altered by the user. In this way, the cheating behavior of a malicious user can be prevented. On the other hand, by using the token techniques, the anonymity of a user can be achieved from the view of a merchant. In this study, we focus on double spending which can make merchant a lot of cost at off-line transaction. We used hash chain to verify the correctness of transactions and prevent the double spending. Tso, Ray Lin 左瑞麟 學位論文 ; thesis 87 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立政治大學 === 資訊科學學系 === 105 === As the coverage of mobile phone has been constantly increased in recent years, the mobile phones have become an indispensable tool in life. Many ways of lives are gradually done through the mobile terminals, for example: No longer need to find the way through the map or search information through the computer, people have also gradually turned to electronic payment via e-wallets instead of paying via physical wallets, such as AliPay in China. Adopting the mobile phone as a wallet is nowadays the main development direction of mobile phones. Meanwhile, people are paying more and more attention to the topics on the security of mobile payment than before. In recent years, under the protection of secure element, the security of users’ mobile phone has been enhanced to a certain extent. In the case of off-line transactions, malicious users are capable of fooling secure element and making double spending. In 2016, Chen et al. proposed a NFC-Based anonymous mobile payment protocol. In that protocol the transaction can only be executed with the involvement of issuer. In this research, we introduce a new protocol which can support both on-line and off-line transactions. Our protocol is modified from that of Chen et al.’s idea. In our protocol, to prevent a malicious user, we use a secure element which stores sensitive information that cannot be altered by the user. In this way, the cheating behavior of a malicious user can be prevented. On the other hand, by using the token techniques, the anonymity of a user can be achieved from the view of a merchant. In this study, we focus on double spending which can make merchant a lot of cost at off-line transaction. We used hash chain to verify the correctness of transactions and prevent the double spending.
author2 Tso, Ray Lin
author_facet Tso, Ray Lin
林承毅
author 林承毅
spellingShingle 林承毅
Anonymous off-line micro-payment protocol with double spending prevention
author_sort 林承毅
title Anonymous off-line micro-payment protocol with double spending prevention
title_short Anonymous off-line micro-payment protocol with double spending prevention
title_full Anonymous off-line micro-payment protocol with double spending prevention
title_fullStr Anonymous off-line micro-payment protocol with double spending prevention
title_full_unstemmed Anonymous off-line micro-payment protocol with double spending prevention
title_sort anonymous off-line micro-payment protocol with double spending prevention
url http://ndltd.ncl.edu.tw/handle/5zmvrf
work_keys_str_mv AT línchéngyì anonymousofflinemicropaymentprotocolwithdoublespendingprevention
AT línchéngyì kěyùfángshuāngzhòngzhīfùdelíxiànxiǎoénìmíngjiāoyìjīzhì
_version_ 1719143499045011456