About Information Security in Electronic Payment Systems
About Information Security in Electronic Payment Systems
Issuer Receiver
Traditional
payment for
electronic coins
Electronic coins
Electronic coins validation
(certification) Deposition Balance
generation and
blindness
Payment
Payer Seller
Goods and services
supply
Payer Seller
Payer Seller
C o m p u te s th e m o d ific a tio n
c ← H (m ,a ) a n d th e
re s p o n s e r← (ω -c S ) m o d q
T h e s ig n a tu re fo r th e
m e s s a g e m is : s ig n ← (c , r) (m , s ig n )
V e rifie s if c = ? H (m , g r ⋅ P c )
S to re s th e p a ir: (m , s ig n )
c = ? H (m , g r ⋅ P c )
= H (m , g ω -c S (g S ) c )
= H (m , g ω ) = H (m , a ) = c
Figure 2. The Schnorr identification protocol
Eliminates the blind factor and obtains the bank’s Substracts the coin’s equivalent
signature for coin’s public key: value from Alice’s account
σdb(P, a)←ρ-1σ' mod nb=[red, H(P, a)]db mod nb
Figure 3. The withdrawal transaction - inserting the payer's ID in the electronic coin by the SC.
k t r P 104 78 26 26 2,1991E-10
2 1 1 0 0,5 106 79 27 26 8,27279E-11
4 3 1 1 0,5 108 81 27 27 9,2779E-11
6 4 2 1 0,2 110 82 28 27 3,48985E-11
8 6 2 2 0,214285714 112 84 28 28 3,91429E-11
10 7 3 2 0,083333333 114 85 29 28 1,47219E-11
12 9 3 3 0,090909091 116 87 29 29 1,65141E-11
14 10 4 3 0,034965035 118 88 30 29 6,21044E-12
16 12 4 4 0,038461538 120 90 30 30 6,96717E-12
18 13 5 4 0,014705882 122 91 31 30 2,61989E-12
20 15 5 5 0,01625387 124 93 31 31 2,93939E-12
22 16 6 5 0,00619195 126 94 32 31 1,10521E-12
24 18 6 6 0,006864989 128 96 32 32 1,2401E-12
26 19 7 6 0,002608696 130 97 33 32 4,66238E-13
28 21 7 7 0,002898551 132 99 33 33 5,23183E-13
30 22 8 7 0,00109945 134 100 34 33 1,96685E-13
32 24 8 8 0,001223582 136 102 34 34 2,20725E-13
34 25 9 8 0,000463478 138 103 35 34 8,29732E-14
36 27 9 9 0,000516447 140 105 35 35 9,3121E-14
38 28 10 9 0,000195412 142 106 36 35 3,50029E-14
40 30 10 10 0,00021796 144 108 36 36 3,92865E-14
42 31 11 10 8,23995E-05 146 109 37 36 1,47663E-14
44 33 11 11 9,19808E-05 148 111 37 37 1,65744E-14
46 34 12 11 3,47483E-05 150 112 38 37 6,22931E-15
48 36 12 12 3,88146E-05 152 114 38 38 6,99251E-15
50 37 13 12 1,46545E-05 154 115 39 38 2,6279E-15
52 39 13 13 1,63785E-05 156 117 39 39 2,95003E-15
54 40 14 13 6,18058E-06 158 118 40 39 1,10861E-15
56 42 14 14 6,91102E-06 160 120 40 40 1,24457E-15
58 43 15 14 2,60679E-06 162 121 41 40 4,67681E-16
60 45 15 15 2,91607E-06 164 123 41 41 5,25065E-16
62 46 16 15 1,0995E-06 166 124 42 41 1,97297E-16
64 48 16 16 1,23039E-06 168 126 42 42 2,21516E-16
66 49 17 16 4,63764E-07 170 127 43 42 8,32325E-17
68 51 17 17 5,19138E-07 172 129 43 43 9,3454E-17
70 52 18 17 1,95617E-07 174 130 44 43 3,51128E-17
72 54 18 18 2,19036E-07 176 132 44 44 3,94266E-17
74 55 19 18 8,25137E-08 178 133 45 44 1,48128E-17
76 57 19 19 9,24154E-08 180 135 45 45 1,66334E-17
78 58 20 19 3,48058E-08 182 136 46 45 6,24901E-18
80 60 20 20 3,89913E-08 184 138 46 46 7,01733E-18
82 61 21 20 1,46819E-08 186 139 47 46 2,63624E-18
84 63 21 21 1,64508E-08 188 141 47 47 2,96049E-18
86 64 22 21 6,19325E-09 190 142 48 47 1,11214E-18
88 66 22 22 6,94071E-09 192 144 48 48 1,24897E-18
90 67 23 22 2,61251E-09 194 145 49 48 4,69174E-19
92 69 23 23 2,92831E-09 196 147 49 49 5,26919E-19
94 70 24 23 1,10205E-09 198 148 50 49 1,97929E-19
96 72 24 24 1,23546E-09 200 150 50 50 2,22297E-19
98 73 25 24 4,64889E-10 202 151 51 50 8,34996E-20
100 75 25 25 5,21239E-10 204 153 51 51 9,37828E-20
102 76 26 25 1,9611E-10 206 154 52 51 3,52257E-20
208 156 52 52 3,95651E-20
210 157 53 52 1,48606E-20 Table 1. The breakdown probability in function of the
number of the terms
For i = 1, ..., L generate random ri∈Z2|q|-80 and Generate the secret IDA for Alice and
compute the secret key Si based on ri and IDA: record it in Alice's smart card SC
Si ← (ri, IDA)∈Zq.
Choose arbitrary the numbers ωi∈Zq. The
secret keys for the coins will be (Si, ωi).
Compute Pi←gSi and ai←gωi mod p. The
coins' public keys will be (Pi, ai).
Choose randomly ρi∈Znb* and compute the
following commitments:
Mi←ρieb⋅[red, H(Pi, ai)] mod nb {Mi}i=1,L
Fig. 4. The base cut and choose protocol for single term coins.
Alice (PC) Banca (B)
Generate at random S∈Zq and ω∈Zq. The Generates Alice's secret IDA and
secret key for the coin is (S, ω). sends it to Alice
Fig. 5. Generalized cut and choose protocol for multi term coins
In fig.6. and 7. there is represented the choose protocol in function of the generated coins'
breakthrough probability of the generalized cut and number.
The breakdown probability for the generalised cut and
choose protocol
0.6
0.5
0.4
0.3 P
0.2
0.1
0
0 50 100 150 200 250
Number of coins
Fig. 6. The probability of the successful test in function of the generated coins number
The breakdown probability for 40 coins
0.6
0.5
Probability
0.4
0.3
0.2
P
0.1
0
0 10 20 30 40 50
Coins number
The security level increases exponentially The seller verifies the validity of the
with the number of the generated coins, but message and registers the payment document
increases also the overloading of the computer (containing the coin’s certified public key, the
network and the number of calculations. The main payment claim, the evidence of the payment claim).
advantage of the proposed protocol is that needs no
temper resistant hardware, and can be implemented
with PC-s! 6. The deposit transaction and clearing