Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach

Author(s):  
J. Torres ◽  
A. Izquierdo ◽  
A. Ribagorda ◽  
A. Alcaide
2012 ◽  
Vol 45 (14) ◽  
pp. 4
Author(s):  
MARY ELLEN SCHNEIDER
Keyword(s):  

2020 ◽  
Vol 2 ◽  
pp. 66-79
Author(s):  
S. L. Morozov ◽  

The advent of the electronic currency and the effecting of electronic payments has caused new forms of thefts and types of acquisitive crimes. The judicial investigative practice of criminal cases of embezzlement committed using bank cards and other types of electronic payments has encountered problems with the qualification of such acts. The author identifies the most common enforcement problemsand their causesby a retrospective study of judicial practice, the changing norms of the criminal law. At the same time, a ten-year period of work of the judicial investigating authorities was studied. On the basis of traditional general scientific methods of cognition, as a result of a system-legal analysis of the considered set of specific situations, the author gives an author's view of the complex of causes that cause a lack of uniformity in judicial investigative practice. Using the hermeneutic approach, the author paid special attention to the application by the courts of the interpretation of the criminal law by the Plenum of the Supreme Court of the Russian Federation in different years. In conclusion, ways of resolving contentious issues of qualification of thefts and fraud in the field of electronic means of payment are proposed. It has been ascertained that high-quality and uniform law enforcement can provide additional clarification on the delimitation of related and competing theft from the Plenum of the Supreme Court of the Russian Federation. It is concluded that in general, the current concept of the Plenum of the Supreme Court of the Russian Federation does not contain contradictions with the novels of the criminal law, but can be improved. The rationale and edition of possible additions to the relevant decision of the Plenum of the Supreme Court of the Russian Federation are given.


Author(s):  
Ashish Joshi ◽  
Amar Kumar Mohapatra

Background & Objective: Cryptographic protocols had been evident method for ensuring con dentiality, Integrity and authentication in various digital communication systems. However the validation and analysis of such cryptographic protocols was limited to usage of formal mathematical models until few years back. Methods: In this paper, various popular cryptographic protocols have been studied. Some of these protocols (PAP, CHAP, and EAP) achieve security goals in peer to peer communication while others (RADIUS, DIAMETER and Kerberos) can work in multiparty environment. These protocols were validated and analysed over two popular security validation and analysis tools AVISPA and Scyther. The protocols were written according to their documentation using the HLPSL and SPDL for analysis over AVISPA and Scyther respectively. The results of these tools were analysed to nd the possible attack an each protocol. Afterwards The execution time analysis of the protocols were done by repeating the experiment for multiple iterations over the command line versions of these tools.As the literature review suggested, this research also validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, Usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS. Results and Conclusion: The results also showed us that DIAMETER is faster than RADIUS. Though Kerberos protocol was found to safe, the results tell us that it is compromisable under particular circumstances.


2020 ◽  
Vol 10 (20) ◽  
pp. 7141
Author(s):  
Ilhwan Lim ◽  
Minhye Seo ◽  
Dong Hoon Lee ◽  
Jong Hwan Park

Fuzzy vector signature (FVS) is a new primitive where a fuzzy (biometric) data w is used to generate a verification key (VKw), and, later, a distinct fuzzy (biometric) data w′ (as well as a message) is used to generate a signature (σw′). The primary feature of FVS is that the signature (σw′) can be verified under the verification key (VKw) only if w is close to w′ in a certain predefined distance. Recently, Seo et al. proposed an FVS scheme that was constructed (loosely) using a subset-based sampling method to reduce the size of helper data. However, their construction fails to provide the reusability property that requires that no adversary gains the information on fuzzy (biometric) data even if multiple verification keys and relevant signatures of a single user, which are all generated with correlated fuzzy (biometric) data, are exposed to the adversary. In this paper, we propose an improved FVS scheme which is proven to be reusable with respect to arbitrary correlated fuzzy (biometric) inputs. Our efficiency improvement is achieved by strictly applying the subset-based sampling method used before to build a fuzzy extractor by Canetti et al. and by slightly modifying the structure of the verification key. Our FVS scheme can still tolerate sub-linear error rates of input sources and also reduce the signing cost of a user by about half of the original FVS scheme. Finally, we present authentication protocols based on fuzzy extractor and FVS scheme and give performance comparison between them in terms of computation and transmission costs.


Photonics ◽  
2021 ◽  
Vol 8 (7) ◽  
pp. 289
Author(s):  
Georgios M. Nikolopoulos

Physical unclonable functions have been shown to be a useful resource of randomness for implementing various cryptographic tasks including entity authentication. All the related entity authentication protocols that have been discussed in the literature so far, either they are vulnerable to an emulation attack, or they are limited to short distances. Hence, quantum-safe remote entity authentication over large distances remains an open question. In the first part of this work, we discuss the requirements that an entity authentication protocol has to offer, to be useful for remote entity authentication in practice. Subsequently, we propose a protocol, which can operate over large distances, and offers security against both classical and quantum adversaries. The proposed protocol relies on standard techniques, it is fully compatible with the infrastructure of existing and future photonic networks, and it can operate in parallel with other quantum protocols, including QKD protocols.


Author(s):  
MARCIN HITCZENKO

Abstract This article develops a two-stage statistical analysis to identify and assess the effect of a sample bias associated with an individual’s household role. Survey responses to questions about the respondent’s role in household finances and a sampling design in which some households have all members take the survey enable the estimation of distributions for each individual’s share of household responsibility. The methodology is applied to the 2017 Survey of Consumer Payment Choice. The distribution of responsibility shares among survey respondents suggests that the sampling procedure favors household members with higher levels of responsibility. A bootstrap analysis reveals that population mean estimates of monthly payment instrument use that do not account for this type of sample misrepresentation are likely biased for instruments often used to make household purchases. For checks and electronic payments, our analysis suggests that it is likely that unadjusted estimates overstate true values by 10–20 percent.


Sign in / Sign up

Export Citation Format

Share Document