Analyses of electronic commerce security

被引:0
作者
Lu, CY [1 ]
Li, M [1 ]
Liang, YM [1 ]
机构
[1] Guilin Univ Elect Technol, Guilin, Peoples R China
来源
THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION | 2003年
关键词
secure electronic transaction; digital signature; data encryption standard; Rivest-Shamir-Privcy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper mainly argues the secure problem of electronic commerce. Security is the life of electronic commerce. Aiming at the architecture of electronic commerce, this paper adopts the method of 'from top to bottom', concentrates on analyzing the SET(Secure Electronic Transaction), which is becoming a more and more important standards as a part of web commerce. First, the protocol flow of SET and the main technology which the SET is based on, such as digital signature, double digital signature, and digital envelope are introduced. Because these technologies are based on two kinds of password systems (Asymmetric Encryption and Symmetric Encryption), the security of asymmetric encryption and symmetric encryption is analyzed through DES (Data Encryption Standard) and RSA (Rivest-Shamir-Privcy) which are the most popular asymmetric encryption and symmetric encryption systems. Then the security of digital signature is analyzed. Finally, the paper analyzes the security ability of SET and the privacy blabbing problem caused by digital signature technology.
引用
收藏
页码:598 / 600
页数:3
相关论文
共 50 条
[31]   Attack-Tolerant Security Model for WS-Security [J].
Jesudoss, A. ;
Subramaniam, N. P. .
2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, :1536-1540
[32]   A new algorithm-free open key encryption system for digital signature with e-Arbitration, particularly suited for e-Commerce, e-Banking and other high security applications [J].
Atsumi, O .
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, :488-493
[33]   The Digital Signature Technology in E-commerce systems [J].
Zhu Junxuan ;
Wu Zhong .
ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, :16-19
[34]   Digital payment systems for Internet commerce: The state of the art [J].
Ureche O. ;
Plamondon R. .
World Wide Web, 2000, 3 (01) :1-11
[35]   E-commerce payment model using blockchain [J].
Kim, Shee-Ihn ;
Kim, Seung-Hee .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) :1673-1685
[36]   Elliptic Curve Cryptography on SET for E-Commerce [J].
Huang, Po-Hsian ;
Deng, Der-Jiunn ;
Lin, Whe-Dar .
JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (05) :827-834
[37]   E-commerce payment model using blockchain [J].
Shee-Ihn Kim ;
Seung-Hee Kim .
Journal of Ambient Intelligence and Humanized Computing, 2022, 13 :1673-1685
[38]   Security analysis of practical anonymous user authentication scheme with security proof [J].
Liu, Chenglian ;
Lin, Changlu ;
Sun, Shuliang .
Information Technology Journal, 2013, 12 (03) :522-525
[39]   On the Quantum Security of HAWK [J].
Fehr, Serge ;
Huang, Yu-Hsuan .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 :405-416
[40]   CADENUS security considerations [J].
Lavrencic, G ;
Jerman-Blazic, B ;
Blazic, AJ .
ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 :267-278