[go: up one dir, main page]

DE DECKER et al., 2004 - Google Patents

UNIDENTIFIABILITY AND ACCOUNTABILITY IN ELECTRONIC TRANSACTIONS

DE DECKER et al., 2004

View PDF
Document ID
4414112758336950049
Author
DE DECKER B
VAN HERREWEGHEN E
Publication year

External Links

Snippet

Accountability, the possibility to hold an individual responsible for his actions, is an important aspect of electronic commerce transactions. Public-key signatures and infrastructures are typical means for achieving accountability: a digital signature which can be verified with a …
Continue reading at www.cs.kuleuven.be (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures

Similar Documents

Publication Publication Date Title
Wang et al. A flexible payment scheme and its role-based access control
Brands Rethinking public key infrastructures and digital certificates: building in privacy
Bellare et al. iKP-A Family of Secure Electronic Payment Protocols.
US10706416B2 (en) System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures
Goldfeder et al. Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
Eslami et al. A new untraceable off-line electronic cash system
US20020073045A1 (en) Off-line generation of limited-use credit card numbers
HK1244098A1 (en) Systems and methods for personal identification and verification
Rubin et al. Off-line generation of limited-use credit card numbers
Petrlic et al. A privacy-friendly architecture for future cloud computing
Chida et al. Digital money–a survey
Hampiholi et al. Privacy-preserving webshopping with attributes
Milutinovic et al. uCentive: An efficient, anonymous and unlinkable incentives scheme
Noam et al. Realizing privacy aspects in blockchain networks
Rial Privacy-preserving e-commerce protocols
CN108090751A (en) Electronic cash system
Wang et al. A consumer scalable anonymity payment scheme with role based access control
Sarencheh et al. PEReDi: Privacy-enhanced, regulated and distributed central bank digital currencies
Bouch 3-D Secure: A critical review of 3-D Secure and its effectiveness in preventing card not present fraud
CN113793149A (en) Off-line transaction authentication system and method, central server and client
DE DECKER et al. UNIDENTIFIABILITY AND ACCOUNTABILITY IN ELECTRONIC TRANSACTIONS
Neera et al. A trustworthy and untraceable centralised payment protocol for mobile payment
CN115170132B (en) Payment method suitable for high-speed post network member system
Gunasinghe et al. RahasNym: Pseudonymous identity management system for protecting against linkability
Al-Bastaki et al. Task based Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security Concepts