期刊文献+

基于可信第三方的安全支付协议的设计与分析 被引量:3

Design and analysis of secure payment protocol based on trusted third party
下载PDF
导出
摘要 设计了一种同时支持数字商品和实物商品在线支付的安全支付协议SETTP。构建了具有交易冲突仲裁和数据备份功能的可信第三方,提出了在银行支付中设置支付时间期限PTE的方法,以确保双方的交易公平。最后分析了SETTP的安全性、原子性和交易公平性。 A payment protocol named Secure Electronic Transaction based on Trusted Third Party (SETTP) was proposed, in which both electronic and physical goods could be paid on line. A trusted third party which has the functions of confliction-arbitrate and data backup was constructed. A method of setting Payment Time Expire (PTE) during the process of bank payment was put forward to make sure the fairness to both parties of the transaction. Finally the characteristics of the SETTP protocol such as security, atomicity and fairness were analyzed.
出处 《计算机应用》 CSCD 北大核心 2006年第12期2910-2912,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(70472005) 江苏省高校自然科学研究计划(03KJD630011) 镇江市科技局项目(2005QT008J)
关键词 SETFP 实物商品 可信第三方 支付时间期限 公平性 SETTP physical goods TFP PTE fairness
  • 相关文献

参考文献6

二级参考文献24

  • 1卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300~1309.http://www.jos.org.cn/1000-9825/14/1300.htm.,.
  • 2卿斯汉.安全协议20年研究进展.软件学报, 2003,14(10):1740~1752.http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 3Tygar J D.Atomicity in Electronic Commerce[C].In :Proceedings of the 15th Annual ACM Symposium on principles of Distributed Computing, 1996 : 8-26.
  • 4Camenisch J,Stadler M.Efticent Group Signature Schemes for large Groups[C].In:KaliskiJrBS ed.Lecture Notes in computer science, 1294. Berlin : springer-verlag. 1997: 410-424.
  • 5Kailer R.Accounability in Electronic Commerce Protocols[J].IEEE Transactions on Software Engineering, 1996; 22 (5) : 313-328.
  • 6ISO/IEC 3rd CD 13888-1. Information technology-Security techniques Part 1: General model. ISO/IEC JTC11/SC24 N1274, 1996.
  • 7Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990,8(1):18-36.
  • 8Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 9Coffey T, Saidha P. Non-Repudiation with mandatory proof of receipt. Computer Communication Review, 1996,26(1):6- 17.
  • 10Deng RH, Gong L, Lazar AA, Wang W. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 1996,4(3):279-297.

共引文献48

同被引文献10

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部