Abstract
Moving electronic tokens or tickets over networks makes business processes more effective. At the same time, such a movement will sometimes produce disturbed results, such as illegal copies, unauthorized disclosures, and accidental destructions. Tamper Resistance Network (TRN) is a secure distribution infrastructure networked among smartcards and other tamper-proof devices. Over TRN, we can move tokens electronically, preventing from being duplicated or lost. In order to enhance the security of online token trading, the control of atomicity and the trace of the movement are discussed. In addition, we will present an initial experimentation, where electronic tickets are sold, exchanged, and examined over the prototyped TRN implementation.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Reference
C. Adams and S. Lloyd. Understanding the Public-Key Infrastructure, Macmillan Technology Series, 1999.
S. Araki. The Memory Stick. IEEE Micro, pages 40–46, July–August 2000.
P. Bernstein and E. Newcomer. Principles of Transaction Processing. Morgan Kaufmann Publishers, 1997.
W. Diffie and M Hellman. New Direction in Cryptography, IEEE Trans. on Information Theory, pages 644–654, IT-22, 6, 1976.
U. Hansmann, M. S. Nicklous, T. Schack. F. Seliger. Smart Card Application Development Using Java. Springer, 2000.
S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. IETF RFC 2401, Nov. 1998. Available at http://www.rfc-editor.org/rfc/rfc2401.txt
K. Kuramitsu et al. TTP: Secure ACID Transfer Protocol for Electronic Ticket between Personal Tamper-Proof Devices. In Proceedings of the 24th Annual International Computer Software & Applications Conference (IEEE COMPSAC2000), Oct. 2000.
K. Kuramitsu and K. Sakamura. PCO: EC Content Description Language Supporting Distributed Schema across the Internet. Journal of IPSJ, pages 110–122. Vol. 41 No. 1, Jan. 2000.
W. Townsley et al., Layer Two Tunneling Protocol (L2TP), IETF RFC 2661, Aug. 1999. available at http://www.rfc-editor.org/rfc/rfc2661.txt
J.D. Tygar. Atomicity in Electronic Commerce. In Proceeding of the 5th Annual ACM Symposium on Principles of Distributed Computing. May 1996.
Matsuyama and K. Fujimura. Distributed Digital-Ticket Management for Rights Trading System, In Proceedings of the ACM EC’99, November 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Kuramitsu, K., Sakamura, K. (2001). Tamper-Resistance Network. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds) Towards the E-Society. IFIP International Federation for Information Processing, vol 74. Springer, Boston, MA. https://doi.org/10.1007/0-306-47009-8_9
Download citation
DOI: https://doi.org/10.1007/0-306-47009-8_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7529-6
Online ISBN: 978-0-306-47009-7
eBook Packages: Springer Book Archive