Sunteți pe pagina 1din 6

A NOVEL PEER-TO-PEER PAYMENT SYSTEM

Despoina Palaka
Information Processing Laboratory, Electrical and Computer Engineering Department
Aristotle University of Thessaloniki, 540 06 Thessaloniki, Greece
Email: palaka@iti.gr

Petros Daras, Kosmas Petridis and Michael G. Strintzis


Informatics and Telematics Institute
1st km Thermi-Panorama Road, GR-57001 Thermi, Thessaloniki, Greece
Email: strintzi@eng.auth.gr

Key words: peer-to-peer, e-payment, anonymous payment.

Abstract: In this paper a novel payment system for Peer-to-Peer (P2P) commerce transactions is presented. It imple-
ments electronic cash-based transactions, between buyers and merchants. In this system, financial institutions
become partners in the e-commerce transaction, conducted by their customers over the Internet. The innova-
tion of the proposed system is the reduction of the involvement of the financial institutions to ancillary support
services. Moreover, the proposed system can be characterized as distributed allocation of provinces to mer-
chants, who are responsible for locally authorizing payments. Finally, it is optimized for repeated payments
to the same merchants.

1 INTRODUCTION bandwidth and storage are being exploit. Further,


computers that traditionally have been used solely as
clients communicate directly among themselves and
With the turn of the century over 70 mil-
can act both as clients and servers, assuming what-
lion computers are connected to the Internet.
ever role is needed at each moment. The new P2P
Successful electronic business sites like Ama-
networking paradigm offers new possibilities for elec-
zon.com (http://www.amazon.com/) or ebay
tronic commerce. Customer peers interchange roles
(http://www.ebay.com/) had foreseen the busi-
with merchant peers in this new network economy.
ness potential of the huge number of users and
offer world-wide services to consumers for buying In this paper a new electronic-payment system is
and selling goods using their web browsers. These presented. The proposed electronic payment sys-
business sites provide a centralized trading platform, tem is based on the novel “peer-to-peer” protocol
which offers a certain degree of security to its (P. Daras, 2003). This system is considered able
customers. The advantage of such a centralized to exploit the capabilities offered by P2P networks.
architecture is that rules can be enforced easily. How- The new system provides a complete anonymous, se-
ever, this turns into a severe problem if we switch cure and practical framework in which each peer can
the point of view: In any centralized architecture act both as a merchant and a customer. Further, the
the central entity is a single point of failure and a proposed system provides a full and secure payment
bottleneck in terms of bandwidth and computing mechanism where personal information (order infor-
recourses which limits scalability and in turn causes mation) cannot be exposed to unauthorized third par-
high infrastructure requirements. ties.
Nowadays these kinds of drawbacks have lit a fire The proposed peer-to-peer payment system uses
under the peer-to-peer (P2P) movement. P2P comput- the basic feature of the Secure Electronic Transaction
ing, a term coined after the strong and delivering con- (SET) protocol (Mastercard, 1997), the digital enve-
tents using peer users’ computers, scheme, is increas- lope technique. In SET, message data is encrypted us-
ingly receiving attention as a new distributed comput- ing a randomly generated key that is further encrypted
ing paradigm for its potential to harness “edge” com- using the recipient’s public key. This is referred to as
puters, such as PCs and handheld devices, and make the “digital envelope” of the message and is sent to the
their underutilized resources available to each other. recipient with the encrypted message. it can be used
In P2P architecture inexpensive computation power, for macro-payments as well as for micro-payments. It

1
enables merchants to locally authorize payments and
it uses Millicent’s (S. Glassman, 1995) main concept,
scrip, which is electronic cash issued by the bank or Customer Merchant
the merchant.
The rest of the paper is organized as follows. In the
following Section a short discussion about traditional
(client/server) payment systems and P2P ones, along
with some basic definitions and notation, is given. Se-
curity considerations regarding the SSL protocol are Internet Internet

presented in Section 3. In Section 4 the main transac-


tion steps of the novel peer-to-peer payment protocol
are drawn. A short description of the proposed pay-
ment system, is given in Section 5. Some security
threats and adversaries as well as the security require-
ments of each party, are described in Section 6. Fi-
nally, conclusions are drawn in Section 7. Financial Network
Customer's Merchant's
Bank Bank
2 P2P PAYMENT SYSTEMS
Combining the P2P characteristics with the elec- Figure 1: Electronic Commerce models
tronic commerce, many companies are promoting
payment services via the P2P infrastructure (Try-
media Systems, Lightshare, PinPost, Center-Span, is essential only in the first two transaction steps
First peer). All these companies claim to support P2P (P. Daras, 2003) till a trustworthy relationship be-
commerce, by using e-mails or SSL (Secure Socket tween the customer and the merchant is established.
Layer) (A.O. Freier, 1996) for the purchase transac- In the third step, which is the payment transaction, its
tion. But, these systems enable payments through role is the one of a trusted observer that records the
the legacy infrastructure (e.g., clearing and settlement details of the transaction, so that disputes can be han-
systems) of the financial institutions. In these pay- dled.
ments systems there is not a direct communication In the proposed payment system the merchant can
(P2P communication) between payer (customer) and authorize payments. This is accomplished by the use
payee (merchant) (Figure 1). Additionally, the luck of the scrip. As described in (P. Daras, 2003) there
of the acquirer gateway is essential, because the “sin- are two kind of scrips: BrokerScrip and VendorScrip.
gle point failure” problem is eliminated. On the other The first one can be produced and verified only by
hand, in existing non-P2P systems, like SET, which is the broker and it is used by customers in order to ob-
considered to be the most successful and secure pay- tain VendorScrip. VendorScrip can be produced and
ment system, the problem introduced by the payment verified by merchants and can be redeemed only to
gateway is essential, but it would be naive to neglect its producer. The main reason for using this type of
that the acquirer gateway’s role is essential for secu- electronic cash (scrip) is to relieve the banks front-
rity and financial reasons and it cannot be omitted. In end (broker) from overload and to distribute it in the
the proposed system three parties are involved (Fig- other parties involved in a product’s purchase. Thus,
ures 2,3): the customer (who makes the actual pay- though the proposed system is based on a central en-
ment), the merchant (who receives the payment) and tity (broker), its major differentiating factor from tra-
the acquirer gateway (who acts as an intermediary be- ditional electronic commerce models is the reduction
tween the electronic payment world and the existing of the competence of the financial institutions.
payment infrastructure and authorizes transactions by
using the latter). Hereafter, the acquirer gateway will
be addressed as simply the broker. The broker, who is
used to “bless” the transactions and to enable a trust 3 SECURITY CONSIDERATIONS
relationship between the parties, introduces the prob- OF SSL
lem of “single point failure”. However, in this pay-
ment system the broker’s participation in the trans- While scalability and fault-tolerance come
actions has been minimized in order to minimize the implicitly with P2P infrastructures, as has
effect of the problem that the broker introduces. been proven by successful P2P systems like
In the propsed payment system the broker’s role Kazaa (http://www.kazaa.com/) or Gnutella

2
payment security is very limited.

Customer Merchant • Regarding the broker, the use of SSL is completely


transparent since no messages are signed, thus the
merchant does not gain any security.
Internet
• SSL does not hide bank account numbers or any
other information from the merchant. Thus, it can-
not be used in ID-based authorization.

• Unlike SET or peer-to-peer protocol (P. Daras,


2003), SSL does not mandate any specific public-
key infrastructure. Thus, there is no guarantee that
a customer can verify the merchant’s public-key.

• In SSL, merchants and brokers need additional


Broker mechanisms (beyond SSL) to transmit bank ac-
count data and authorization information.

KA is a 192-bits long,
Financial Network symmetric key.
is a 1024-bits long, private
Customer's Merchant's K Pr
Bank Bank (asymmetric) key.
is a 1024-bits long, public
K Pu
(asymmetric) key.
Figure 2: P2P payment system Symmetric encryption
Enc KA (.) using the AES (Rijndael)
algorithm.
C Customer
Digital signature that uses
M Merchant
the SHA1 algorithm for
B Broker Sign KPr (.)
hashing and the RSA
algorithm for encrypting.
Figure 3: Parties
Asymmetric encryption
(using the RSA algorithm)
SignOnly K Pr (.) of a message digest
(http://gnutella.wego.com/), security guarantees produced by the SHA1
similar to centralized architectures are more difficult algorithm.
to be achieved in a distributed environment. More- Symmetric encryption
over, there is a widespread agreement that electronic (using the Rijndael
commerce means for secure electronic payments are algorithm) of the
needed. Indeed, the appeal of electronic commerce Enc K A (SignOnly KPr (.))
cipher-text produced by
without electronic payment is limited. Further, the SignOnly KPr (.)
insecure electronic payments are more likely to
impede, than to promote, electronic commerce. Thus function.
the premise of security for electronic payments is of Asymmetric encryption
the most importance. SSL is the de facto standard
PKEnc KPu (.)
using the RSA algorithm.
for secure (i.e., encrypted and integrity-protected)
communication on the web and it is integrated in X,Y X is concatenated with Y.
almost all web browsers and servers. SSL uses asym-
metric encryption but typically only the merchants
have public-keys and the customers are anonymous. Figure 4: Cryptographic Primitives
Encrypting bank account data with SSL is certainly
better than sending them in the clear, but the gain in

3
4 THE NOVEL PEER-TO-PEER 4.1 Obtain electronic cash from the
PROTOCOL bank (BrokerScrip)

In Figure 4 the notation of cryptographic primitives


used in the protocol is presented, while in Figure 5 the Initially the customer has neither BrokerScrip nor
notation of the basic message elements used in the electronic cash from the merchant (VendorScrip).
payment protocol is shown. Through this transaction step (Figure 6), s/he estab-
lishes a connection to the broker and buys, using real-
money, the desirable BrokerScrip. Having received
Ci the payment, the broker delivers the BrokerScrip to
Label of the message . the customer. The customer possesses only one Bro-
UID i Unique identifier of the peer user. kerScrip and s/he can obtain a new one only if s/he
Value of the BrokerScrip , VendorScrip or product. has spent it all. The BrokerScrip is used so as to ob-
Wt
tain electronic cash from a merchant.
N Random generated nonce.
ID i Unique identifier of the customer's or merchant's
bank account.
Br j BrokerScrip . M1
Customer Merchant
Vj VendorScrip . M2
CS t BrokerScrip's or VendorScrip's corresponding
CustomerSecret.
Authorization message. R="OK" or " NOK "
M3
R
OI Order information consisting of the product's M0
name, price, quantity and a unique identifier.
Broker

Figure 5: Notation of some basic message elements


C0 Initiate Purchase request
X0 UID M, WP

M0 M 0 C 0 , UID C , Sign KC(X 0 )


Customer Merchant C1 Purchase request
X1 V 0 , CS V 0 , OI
M1
M1 C 1 , UID C , Enc K 0(Sign K C(X 1 )) ,
PKEnc K M(K 0 )
C 0 BrokerScrip request
C2 Purchase response
X 0 W Br , N
X2 V 1 , CS V 1 , OI
M 0 C 0 , UID C , Enc K0(SignOnly K C(ID C )) ,
Enc K0(Sign K C(X 0 )) , PKEnc KB (K0 ) M2 C 2 , UID M , Enc K 1(Sign K C(X 2 )),
PKEnc K C(K 1 )
C 1 BrokerScrip response
C3 Purchase request initiated
X 1 Br 0 , CS 0 , N
X3 UID C , W P
M 1 C 1 , UID B , Enc K1 (Sign KB (X 1)) ,
PKEnc KC (K1 )
M 3 C 3 , UID M , Sign KM(X 3 )

Figure 7: Buy Item


Figure 6: Obtain electronic cash from the bank

4
4.2 Obtain electronic cash from the signatures of the messages sent by the customer and
merchant the merchant, and then record to a file the details of
the transaction).
Implemented on the JXTA (the term “JXTA” is
When a customer has electronic cash from the bank short for juxtapose, as in side by side. It is recogni-
and s/he wishes to purchase an item from a merchant, tion that P2P is juxtaposed to client-server or Web-
s/he needs to obtain electronic cash from the specific based computing, which is today’s traditional dis-
merchant (VendorScrip). If the value of the owned tributed computing model) platform, the proposed
BrokerScrip is bigger or equal to the one of the de- system does not require any special hardware and it
sirable VendorScrip, this transaction step is initiated can be implemented in any platform.
(Figure 8). Further, it offers some kind of divisibility by allow-
Note, that the requested VendorScrip can be used ing users to pay small valued products using high val-
for payments only to this specific merchant. The bro- ued scrip and returning the change as new scrip.
ker beyond the verification of the scrip, serves as an Regarding the role inversion the proposed system
observer of the transaction who records the details of has interchangeable roles; it allows users to assume
it. different roles (a user can act both as a merchant and
a customer), when convenient. However, it does not
4.3 Buy Item allow users to become the bank.
In terms of security, the proposed system ensures
If the customer wishes to purchase an item from a spe- user’s privacy by allowing anonymous purchases, se-
cific merchant and has the appropriate VendorScrip, curing transfers and protecting critical information.
this scrip can be sent to the merchant (Figure 7). The Furthermore, it provides the means to detect unautho-
merchant checks and validates the VendorScrip, s/he rized data modification using an auditing mechanism
reduces its value and sends a new VendorScrip (the so that errors or misuse can be detected.
change) to the customer. This interaction means that
the customer has paid the merchant. In this transac-
tion step both the customer and the merchant inform 6 SECURITY REQUIREMENTS
the broker that a transaction is about to take place or
has taken place, respectively. AND SECURITY ANALYSIS OF
THE SYSTEM

5 DESCRIPTION OF THE Internet is a heterogeneous network, without sin-


gle ownership of the network resources and functions.
PROPOSED PAYMENT SYSTEM In particular, one cannot exclude the possibility that
messages between the legitimate parties would pass
The proposed payment system is as an on-line sys- through a maliciously controlled computer. Further,
tem; the central authority (broker) must be contacted the routing mechanisms in Internet are not designed
during the “Obtain BrokerScrip” and “Obtain Ven- to protect against malicious attacks. Therefore nei-
dorScrip” transaction steps, in order to “bless” value ther confidentiality nor authentication for messages
transfers and in the “Buy item” transaction step in or- sent over the Internet can be assumed, unless proper
der to record the transaction details. Even though the cryptographic mechanisms are employed.
online systems are more demanding in terms of com- Additionally, one must be concerned about the
munication complexity, than the offline systems, they trustworthiness of the merchants providing Internet
are considered more secure than the last ones. Addi- service. The kind of business that is expected in the
tionally, the proposed system can be characterized as Internet includes the so-called cottage industry-small
direct-payment system, because it requires an interac- merchants. It is very easy for an adversary to set up
tion between payer and payee. a shop and put up a fake electronic storefront in order
This system is proper for micro-payments as well to get customers’ secrets (e.g. (Wallich, 1999)). This
as for macro-payments. The desirable usage sce- implies that the customers’ bank account numbers or
nario which fully exploits the benefits of the pro- PINs should travel from customer to broker without
posed system is the one where the customer obtains, being revealed to the merchant.
using macro-payment, BrokerScrip and VendorScrip Finally, in a payment system based on electronic
and then pays for the items using micro-payments. In cash, customers should be considered trustworthy.
this scenario the interaction with the broker is min- Customers’ attacks on the proposed system are lim-
imized and even more his/her role is reduced to the ited to scrip attacks. These attacks are: double-
one of an external observer (less computation power spending, faulty scrip attack and scrip forgery. Dou-
is needed, because s/he has just to verify the digital ble spending involves spending scrip more than once,

5
faulty scrip attack involves creation of scrip without
the correct structure and scrip forgery attack involves
forging the scrip’s data.
1. Double spending: scrip is concatenated with
M1
two secrets the MasterScripSecret and the Master- Customer Merchant
CustomerSecret (P. Daras, 2003). These secrets are
known only to the producer of the scrip. Each time M5
a scrip is used, its secrets are deleted from the pro-
ducer’s look up tables, ensuring that the scrip can- M3 M2 M4
not be re-spent.
2. Faulty scrip: each user of the payment proto- M0
col can act both as merchant and customer and s/he
is able to produce scrip, but this scrip can only be Broker
used to authorize payments with its producer (the
scrip carries the Producer’s ID).
C0 Initiate VendorScrip request
3. Scrip forgery: scrip consists of the scrip body,
which contains the information of the scrip and a X0 UID M
certificate, which is the signature of the scrip. Any M0 C 0 , UID C , Enc K 0(SignOnly K C(ID C )) , Enc K0
alteration of the information contained in the scrip (Sign K C(X0 )) , PKEnc K B (K 0 )
body can be detected by verifying the scrip’s cer-
tificate. C1 VendorScrip request
X 1 Br 0 , CS Br 0 , W V
X2 WV
7 CONCLUSIONS
M1 C 1 , UID C , Enc K 1(SignOnly K C(ID C )),
In this paper a new payment system is presented. Enc K 1(Sign K C(X1 )) , PKEnc K B (K 1 ) ,
This system is designed to be used in P2P networks. Enc K 2(Sign K C(X2 )) , PKEnc K M(K 2 )
In this system the broker’s participation is reduced in C2 Authorization request
order to reduce the “single point of failure” problem.
Further, the new system is compliant to all parties’ re- X3 WV
quirements involved in a transaction and offers confi- M2 C 2 , UID M , Enc K 3(SignOnly K M(ID M )),
dentiality and full anonymity to the customers. More- Enc K 3(Sign K M(X3 )) , PKEnc K B (K 3 ) ,
over, it establishes a framework for enabling secure Enc K 1(SignOnly K C(ID C )) , Enc K 1(Sign K C(X1)) ,
payment transactions. PKEnc K B (K 1)
C3 Change BrokerScrip
REFERENCES X4 Br 1 , CS Br 1
M3 C 3 , UID B , Enc K 4(Sign K B (X4 )) , PKEnc K C(K 4 )
A.O. Freier, P. Kariton, P. K. (1996). The ssl protocol: Ver-
sion 3.0. C4 Authorization response
Mastercard, V. (1997). Set 1.0 - se- X5 R
cure electronic transaction specification.
http://www.mastercard.com/set.html. M 4 C 4 , UID B , Sign KB (X5 )
P. Daras, D. Palaka, V. G. D. B. K. P. M. S. (2003). A novel C 5 VendorScrip response
peer-to-peer payment protocol. In Eurocon 2003, The
International Conference on Computer as a tool. Eu- X 6 V 0 ,CS V0
rocon 2003.
M 5 C 5 , UID M ,Enc K5(Sign KB (X 6)) ,
S. Glassman, M. Manasse, M. A. P. G. P. S. (1995). The mil-
licent protocol for inexpensive electronic commerce.
PKEnc K C(K5)
In Proceeding of the 4th International World Wide
Conference.
Wallich, P. (1999). Cyber view: How to steal millions in Figure 8: Obtain electronic cash from the merchant
champ change. In Sci. Amer., pp. 32-33. Sci. Amer.

S-ar putea să vă placă și