期刊文献+

基于IC卡的比特币支付方式设计与实现 被引量:2

Design and implement of the Bitcoin payment system based on IC card
下载PDF
导出
摘要 为了让比特币的使用更加便捷并提高比特币支付的安全性,借助存储安全和使用便捷的IC卡作为支付工具,设计了基于IC卡的比特币支付方式.通过使用主密钥间接加密使用口令和账户私钥机制,解决了使用口令简单导致私钥加密安全度降低的问题;通过分级确认性地址机制,解除了一卡一账户限制,增强了IC卡账户交易的匿名性.为了改进交易签名安全性过度依赖系统随机数的弱点,设计了基于密钥和消息唯一确定的交易签名随机数方案,实现了基于IC卡的比特币私钥安全存储和比特币交易的安全支付.通过实际的刷卡支付实验,表明上述方案效果良好. IC card with its high security, portability and other virtues has become a most widely used payment tool in the financial field. In order to cope with increasingly wide application of the Bitcoin, this research designs Bitcoin payment system based on the IC card in order to improves its safety and convenience. The master key encryption is used to indirectly encrypt password and account private key, avoiding using simple password to cause the reduced safety of private key encryption. Using hierarchical deterministic address will enhance the anonymity of the IC card account. The uniquely determined transaction signature random number scheme based on the key and message will achieve Bitcoin private key secure storage based on IC card and secure payment of Bitcoin transactions.
作者 王卫红 李鹏
出处 《浙江工业大学学报》 CAS 北大核心 2015年第6期618-623,共6页 Journal of Zhejiang University of Technology
基金 国家自然科学专项基金资助项目(61340058) 浙江省自然科学基金资助项目(LZ14F020001)
关键词 比特比支付 IC卡 交易选择 Bitcoin payment IC card transaction selection
  • 相关文献

参考文献15

  • 1NAKAMOTO S. Bitcoin: a peer-to peer electronic cash sys- tem[J]. Consulted, 2008 (1) : 28-38.
  • 2MIERS I, GARMAN C, GREEN M, et al. Zerocoin: anony mous distributed e-cash from bitcoin[C]//Security and Priva- cy. Piscataway.. IEEE,2013:397-411.
  • 3REID F, HARRIGAN M. An analysis of anonymity in the bitcoin system[C]// Security and Privacy in Social Networks. Berlin: Springer, 2013.
  • 4RON D, SHAMIR A. Quantitative analysis of the full bitcoin transaction graph[C]// Financial Cryptography and Data Se- curity. Berlin: Springer,2013.
  • 5BACK A. Hashcash-a denial of service counter-measure[EB/ OL]. [2002-08-01]. http://www, hashcash, org/ papers/hash cash. pdf.
  • 6DWORK C, NAOR M. Pricing via processing or combatting junk mail[C]//Advances in Cryptology CRYPTO' 92. Ber- lin: Springer, 1993.
  • 7BARBER S, BOYEN X, SHI E,et al. Bitter to better how to make bitcoin a better currency[C]// Financial Cryptography and Data Security. Berlin: Springer,2012.
  • 8王履涛.我国银行卡业务发展研究[D].首都经济贸易大学,2010.
  • 9陈杰,应时彦,朱华.基于MFRC522的RFID读卡器设计[J].浙江工业大学学报,2014,42(6):616-620. 被引量:15
  • 10JR, LENSTRA H W. Factoring integers with elliptic curves [J]. Annals of Mathematics,1986,171(3):649-673.

二级参考文献18

  • 1TAO Cheng, LI Jin. Analysis and simulation of RFID anti-collision algorithms[C]//International Conference on Advanced Communication Technology. New York: IEEE Press, 2007: 697-701.
  • 2SHIH D H, SUN P L, YEN D C. Taxonomy and survey of REID anti-collision protocolg[J]. Computer Communications, 2006,29(11) :2150-2166.
  • 3CHEN W C, HORNG S J, FAN Ping-zhi. An enhanced anticollision algorithm in RFID based on counter and staek[C]// Second International Conference on Systems and Networks Communications. New York: IEEE Press,2007 :21-24.
  • 4WANG T P. Enhanced binary search with cut-through operation for anti-collision in RFID systems [J]. IEEE Communication Letters, 2006,10 (4) : 236-238.
  • 5MYUNG J, LEE W J. Adaptive binary splitting for efficient RFID tag anti-collision [J]. IEEE Communication Letters, 2006,10(3) : 144-146.
  • 6LAI Y C, LIN C C. Two blocking algorithms on adaptive binary splitting: single and pair resolutions for RFID tag identi? cation[J]. IEEE/ACM Transactions on Networking,2009,17 (3) :962-975.
  • 7EOM J, LEE T J. Frame-slotted Aloha with estimation by pilot frame and identification by binary selection for RFID anti-collision [C]//International Symposium on Communications and Information Technologies. New York: IEEE Press, 2007 : 1027-1031.
  • 8CAO Mei-ling, ZHOU Xiao, ZHU Yi-hua. An anti-collision algorithm for RFID tags based on-adaptive binary splitting [C]//International Conference on Computer and Electrical Engineering. New York: IEEE Press,2010:307-311.
  • 9VOGT H. Efficient object identification with passive RFID tags[C]//International Conference on Systems, Man and Cybernetics. New York : IEEE Press, 2002 : 98-113.
  • 10FinkenzellerK 陈大才译.射频识别(RFID)技术[M].北京:电子工业出版社,2001..

共引文献23

同被引文献9

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部