A consumer scalable anonymity payment scheme with role based access control

This paper proposes a secure, scalable anonymity and practical payment protocol for Internet purchases, and uses role based access control (RBAC) to manage the new payment scheme. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities. An agent provides a higher anonymous certificate and improves the security of the consumers. The agent will certify re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. With this new method, each consumer can get the required anonymity level, depending on the available time, computation and cost. We also analyse how to prevent a consumer from spending a coin more than once. Furthermore, we use RBAC to manage the new payment scheme. Each user may be assigned one or more roles, and each role can be assigned one or more privileges that are permitted to users in that role. Security administration with RBAC consists of determining operations that must be executed by persons in particular jobs, and assigning employees to proper roles. RBAC can improve system security and reduce conflicts of different roles. The complexities with RBAC can be decreased by mutually exclusive roles and role hierarchies.

[1]  Yiannis Tsiounis,et al.  Fair Off-Line e-cash Made Easy , 1998, ASIACRYPT.

[2]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[3]  Tatsuaki Okamoto,et al.  An Efficient Divisible Electronic Cash Scheme , 1995, CRYPTO.

[4]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Elena Gramatová,et al.  The MD5 Message-Digest Algorithm in the XILINX FPGA , 1994, FPL.

[7]  Hugo Krawczyk,et al.  Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier , 1999, CRYPTO.

[8]  Hua Wang,et al.  Untraceable off-line electronic cash flow in e-commerce , 2001, Proceedings 24th Australian Computer Science Conference. ACSC 2001.

[9]  S. Griffis EDITOR , 1997, Journal of Navigation.

[10]  Yiannis Tsiounis,et al.  On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.

[11]  Ravi S. Sandhu,et al.  Role activation hierarchies , 1998, RBAC '98.

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[14]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[15]  Konstantin Beznosov,et al.  Supporting relationships in access control using role based access control , 1999, RBAC '99.

[16]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[17]  David Pointcheval,et al.  Self-Scrambling Anonymizers , 2000, Financial Cryptography.

[18]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[19]  Michael Stumm,et al.  NetCents: A Lightweight Protocol for Secure Micropayments , 1998, USENIX Workshop on Electronic Commerce.

[20]  D. Richard Kuhn,et al.  A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.

[21]  Benjamin Cox,et al.  NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.

[22]  Yanchun Zhang,et al.  A Protocol for Untraceable Electronic Cash , 2000, Web-Age Information Management.

[23]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.