Skip to main content

Blinding of Credit Card Numbers in the SET Protocol

  • Conference paper
  • First Online:
Financial Cryptography (FC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1648))

Included in the following conference series:

Abstract

We present and analyze the cryptographic techniques used in the SET protocol to implement the blinding of credit card numbers in SET certificates. This blinding is essential to protect credit card numbers from eavesdroppers in the network, and even from some merchants, as required by SET. Without these measures, bulk credit card information could be easily collected thus significantly increasing the risk and amount of credit card fraud.

We first present the security requirements from this blinding operation, which include aspects of secrecy and fraud protection, then show a solu- tion to the problem (implemented in SET) and analyze its security based on well-defined cryptographic assumptions. Interestingly, we show that the requirements for blinding in SET are equivalent to the requirements of non-interactive commitment schemes in cryptography. Thus, our so- lution for SET represents an efficient implementation of a commitment function and as such may be suitable for use in other practical contexts as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.setco.org/set.html

  2. Bellare, M., Canetti, R., and Krawczyk, H., “Keying Hash Functions for Message Authentication”, Advances in Cryptology-CRYPTO 96 Proceedings, Lecture Notes in Computer Science, Springer-Verlag Vol. 1109, N. Koblitz, ed, 1996, pp. 1–15.

    Google Scholar 

  3. Bellare, M., Canetti, R., and Krawczyk, H., “Pseudorandom Functions Revisited: The Cascade Construction”. Proc. of the 37th IEEE Symp. on Foundation of Computer Science, 1996, pp. 514–523.

    Google Scholar 

  4. M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, and M. Waidner, “iKP-A Family of Secure Electronic Payment Protocols”, Proceedings of the First USENIX Workshop on Electronic Commerce, NY, July 1995, pp. 89–106.

    Google Scholar 

  5. Bellare, M., and Rogaway N., “Random Oracles are Practical: A Paradigm for Defining Efficient Protocols”, Proc. of the First ACM Conference on Computer and Communications Security, 1993, pp.62–73.

    Google Scholar 

  6. I.B. Damgard, T.P. Pedersen and B. Pfitzmann, “On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures”, Advances in Cryptology: CRYPTO’ 93, Lecture Notes in Computer Science, volume 773, Springer, New York, 1994. Pages 250–265.

    Google Scholar 

  7. O. Goldreich, S. Goldwasser and S. Micali, “How to construct random functions,” Journal of the ACM, Vol. 33, No. 4, 210–217, (1986).

    Article  MathSciNet  Google Scholar 

  8. Goldwasser, S., and S. Micali, “Probabilistic Encryption”, JCSS, Vol. 28, No. 2, 1984.

    Google Scholar 

  9. Halevi, S. and Micali, S., “Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing”, in Advances in Cryptography-CRYPTO’ 96, pages 201–215, 1996. Springer-Verlag.

    Google Scholar 

  10. Krawczyk, H., Bellare, M., and Canetti, R., “HMAC: Keyed-Hashing for Message Authentication”, RFC 2104, February 1997.

    Google Scholar 

  11. Naor, M., “Bit Commitment Using Randomness”, Journal of Cryptology, Vol. 2, pp. 151–158, 1991. (Preliminary version in Crypto’89.)

    Google Scholar 

  12. National Institute for Standards and Technology, “Digital Signature Standard (DSS) ”, Technical Report 169, August 30 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Krawczyk, H. (1999). Blinding of Credit Card Numbers in the SET Protocol. In: Franklin, M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-48390-X_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66362-1

  • Online ISBN: 978-3-540-48390-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics