ID-Based Certificateless Electronic Cash on Smart Card against Identity Theft and Financial Card Fraud

نویسندگان

  • Yalin Chen
  • Jue-Sam Chou
چکیده

Secure electronic payment instruments play an important role in retail electronic commerce. As in most countries, people in Taiwan often use credit cards for payments on Internet shopping. However, the information contained in the card includes sensitive data like card number, valid date, and CVC (Card Verification Code) which all easily suffer data leakage, or impersonation attacks. This may cause the banks, merchants, or user to suffer serious losses. In this paper, we propose an IDbased untraceable electronic cash without card number or personal information to mitigate the risk of data leakage. Meanwhile, our method also considers preventing the anonymity abuse and adds the function of anonymity revocation through a trust party. In addition, due to the proposed is an IDbased scheme, it has the advantage of PKI (Public Key Infrastructure) free and thus save the certificate management cost.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes

With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...

متن کامل

Analysis of Security Issues in Electronic Payment Systems

The emergence of e-commerce has created new financial needs that in many cases cannot be effectively fulfilled by the traditional payment systems. Recognizing this, virtually all interested parties are exploring various types of electronic payment systems, issues surrounding electronic payment system and digital currency. Broadly, electronic payment systems can be classified into four categorie...

متن کامل

Cryptanalysis of a New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack

In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks. In this paper, we analyze the security of Lee’s scheme and show that the scheme is in fact insecure against insider-assisted attack, even if the adversary doesn’t know the secret information stored in...

متن کامل

Differentiating identity theft: An exploratory study of victims using a national victimization survey☆

Despite the widespread attention given to identity theft, there is much confusion on how best to define and measure it. Recent attempts to measure its extent through victimization surveys or law enforcement files have varied considerably in the types of crimes included as identity theft. Some studies include credit card fraud, while others exclude it. This inconsistency in data collection has m...

متن کامل

Comparative Study and Simulation of Digital Forensic Tools

The cyber crimes such as online banking fraud, credit card theft, child pornography, intellectual property theft, identity theft, unauthorized intrusion, money laundering, digital piracy etc. are growing rapidly with technology. Desktops, smartphones, laptops, digital cameras, GPS devices and even watches all can be used to aid a fraud. All this devices leave behind a digital footprint. Gatheri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014