Return to search

Theoretical examination and practical implementation on cryptography algorithms, digital money protocols and related applications.

by Shek Wong. / Thesis submitted in: December 1997. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 90-[94]). / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Electronic Commerce --- p.3 / Chapter 1.2 --- Electronic Cash --- p.7 / Chapter 1.3 --- What This Report Contains --- p.9 / Chapter 2 --- Cryptographic Background --- p.11 / Chapter 2.1 --- Euler Totient Function --- p.12 / Chapter 2.2 --- Fermat's Little Theorem --- p.12 / Chapter 2.3 --- Quadratic Residues --- p.12 / Chapter 2.4 --- Legendre Symbol --- p.13 / Chapter 2.5 --- Jacobi Symbol --- p.14 / Chapter 2.6 --- Blum Integer --- p.16 / Chapter 2.7 --- Williams Integer --- p.18 / Chapter 2.8 --- The Quadratic Residuosity Problem --- p.19 / Chapter 2.9 --- The Factorization Problem --- p.20 / Chapter 2.10 --- The Discrete Logarithm Problem --- p.20 / Chapter 2.11 --- One-way Functions --- p.21 / Chapter 2.12 --- Blind Signature --- p.22 / Chapter 2.13 --- Cut-and-choose Methodology --- p.24 / Chapter 3 --- Anatomy and Panorama of Electronic Cash --- p.26 / Chapter 3.1 --- Anatomy of Electronic Cash --- p.26 / Chapter 3.1.1 --- Three Functions and Six Criteria --- p.28 / Chapter 3.1.2 --- Untraceable --- p.29 / Chapter 3.1.3 --- Online and Off-line --- p.30 / Chapter 3.1.4 --- Security --- p.32 / Chapter 3.1.5 --- Transferability --- p.33 / Chapter 3.2 --- Panorama of Electronic Cash --- p.34 / Chapter 3.2.1 --- First Model of Off-line Electronic Cash --- p.34 / Chapter 3.2.2 --- Successors --- p.35 / Chapter 3.2.3 --- Binary Tree Based Divisible Electronic Cash --- p.36 / Chapter 4 --- Spending Limit Enforced Electronic Cash --- p.37 / Chapter 4.1 --- Introduction to Spending Limit Enforced Electronic Cash --- p.37 / Chapter 4.2 --- The Scheme --- p.41 / Chapter 4.3 --- An Example --- p.44 / Chapter 4.4 --- Techniques --- p.47 / Chapter 4.5 --- Security and Efficiency --- p.51 / Chapter 5 --- Interest-bearing Electronic Cash --- p.53 / Chapter 5.1 --- Introduction to Interest-bearing Electronic Cash --- p.53 / Chapter 5.2 --- An Example --- p.55 / Chapter 5.3 --- The Scheme --- p.55 / Chapter 5.4 --- Security --- p.57 / Chapter 5.5 --- An Integrated Scheme --- p.58 / Chapter 5.6 --- Applications --- p.59 / Chapter 6 --- Abacus Type Electronic Cash --- p.61 / Chapter 6.1 --- Introduction --- p.61 / Chapter 6.2 --- Abacus Model --- p.63 / Chapter 6.3 --- Divisible Abacus Electronic Coins --- p.66 / Chapter 6.3.1 --- Binary Tree Abacus Approach --- p.66 / Chapter 6.3.2 --- Multi-tree Approach --- p.57 / Chapter 6.3.3 --- Analysis --- p.69 / Chapter 6.4 --- Abacus Electronic Cash System --- p.71 / Chapter 6.4.1 --- Opening Protocol --- p.71 / Chapter 6.4.2 --- Withdrawal Protocol --- p.74 / Chapter 6.4.3 --- Payment and Deposit Protocol --- p.75 / Chapter 6.5 --- Anonymity and System Efficiency --- p.78 / Chapter 7 --- Conclusions --- p.80 / Chapter A --- Internet Payment Systems --- p.82 / Chapter A.1 --- Bare Web FORM --- p.82 / Chapter A.2 --- Secure Web FORM Payment System --- p.85 / Chapter A.3 --- Membership Type Payment System --- p.86 / Chapter A.4 --- Agent Based Payment System --- p.87 / Chapter A.5 --- Internet-based POS --- p.87 / B Papers derived from this thesis --- p.89 / Bibliography --- p.90

Identiferoai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_322385
Date January 1998
ContributorsWong, Shek., Chinese University of Hong Kong Graduate School. Division of Information Engineering.
Source SetsThe Chinese University of Hong Kong
LanguageEnglish, Chinese
Detected LanguageEnglish
TypeText, bibliography
Formatprint, ix, 90, [4] leaves : ill. ; 30 cm.
RightsUse of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Page generated in 0.0078 seconds