{"title":"使用X.509 v3证书私有扩展和智能卡提高在线交易中的用户隐私","authors":"Blerim Rexha","doi":"10.1109/ICECT.2005.54","DOIUrl":null,"url":null,"abstract":"Security and privacy are central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Public key infrastructure and X.509 certificates have been established as the most trustworthy methods for assuring security in online transactions. This paper proposes a new approach for increasing security by avoiding privacy violation using X.509 version 3 certificate private extensions and storing the certificate and its corresponding private key in the smartcard. The private key never leaves the smartcard and can be used for decryption and signing only after successful personal identification number presentation. The proposed approach is compared with secure electronic transaction (SET) protocol.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Increasing user privacy in online transactions with X.509 v3 certificate private extensions and smartcards\",\"authors\":\"Blerim Rexha\",\"doi\":\"10.1109/ICECT.2005.54\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security and privacy are central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Public key infrastructure and X.509 certificates have been established as the most trustworthy methods for assuring security in online transactions. This paper proposes a new approach for increasing security by avoiding privacy violation using X.509 version 3 certificate private extensions and storing the certificate and its corresponding private key in the smartcard. The private key never leaves the smartcard and can be used for decryption and signing only after successful personal identification number presentation. The proposed approach is compared with secure electronic transaction (SET) protocol.\",\"PeriodicalId\":312957,\"journal\":{\"name\":\"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECT.2005.54\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECT.2005.54","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Increasing user privacy in online transactions with X.509 v3 certificate private extensions and smartcards
Security and privacy are central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Public key infrastructure and X.509 certificates have been established as the most trustworthy methods for assuring security in online transactions. This paper proposes a new approach for increasing security by avoiding privacy violation using X.509 version 3 certificate private extensions and storing the certificate and its corresponding private key in the smartcard. The private key never leaves the smartcard and can be used for decryption and signing only after successful personal identification number presentation. The proposed approach is compared with secure electronic transaction (SET) protocol.