Author: |
曾志騰 Chih-Teng Tseng |
---|---|
Thesis Title: |
供實體交易之匿名電子發票機制 - 以台灣電子發票為例 rivacy-Preserving E-Invoicing in Physical Channels via Near Field Communication - An Example based on Taiwan’s Uniform E-Invoice System |
Advisor: |
查士朝
Shi-Cho Cha |
Committee: |
羅乃維
Nai-Wei Lo 林俊叡 Raymund Lin |
Degree: |
碩士 Master |
Department: |
管理學院 - 資訊管理系 Department of Information Management |
Thesis Publication Year: | 2014 |
Graduation Academic Year: | 102 |
Language: | 中文 |
Pages: | 40 |
Keywords (in Chinese): | 電子發票 、零知識證明 、匿名性 、近端通訊技術 |
Keywords (in other languages): | Near Field Communication, E-invoice, Anonymity, Zero-knowledge proof |
Reference times: | Clicks: 620 Downloads: 0 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
世界各國在推動 B2C 電子發票時,為了要識別發票的擁有者,常會在發票資 訊中加入使用者的識別資訊;然而,因為使用者會擔心交易被追蹤,抗拒使用電 子發票。
本研究提出使用零知識證明的作法讓使用者在交易時,產生不同的機密資訊, 並且利用此機密資訊產生交易的電子發票的識別資訊,之後,使用者就可在不洩 漏機密資訊的情況下,證明自己是某張電子發票的擁有者。而基於台灣電子發票 近端傳輸標準進行改良,使其在原有提供載具號碼產生發票的方法,能更進一步 產生匿名電子發票,而使用者也能因為隱私被保護更接受電子發票,本研究可望 進一步落實無紙化。
Countries around the world promote e-invoices recently. To identify buyers of trans- actions, merchants may request customer to provide their identifiable information and embed the identifiable information in e-invoices. Therefore, a person can prove that he/ she is the buyer of an e-invoice based on the identifiable information on the e-invoice. However, people may worry that merchants track their buying behaviors. Therefore, peo- ple may hesitate to use e-invoices. To address the issue, this study proposes a method to enable a person to generate different identities for different e-invoices based on zero- knowledge proof technology. Thus, the person can then prove that he or she generates identities of e-invoices without revealing secrets to generate the e-invoices.
[1] J. Woo, A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino, “Verification of Receipts from M- commerce Transactions on NFC Cellular Phones,” in E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services, 2008 10th IEEE Conference on, pp. 36–43, IEEE, July 2008.
[2] M. Mut-Puigserver, M. M. Payeras-Capellà, J.-L. Ferrer-Gomila, A. Vives-Guasch, and J. Castellà- Roca, “A survey of electronic ticketing applied to transport,” Computers & Security, vol. 31, no. 8, pp. 925 – 939, 2012.
[3] E.B.AbhilashaBhargav-Spantzel,JunghaWoo,“Receiptmanagement-transactionhistorybasedtrust establishment,” 2007.
[4] F. Paci, N. Shang, S. Kerr, K. Steuer Jr, J. Woo, and E. Bertino, “Privacy-preserving Management of Transactions’ Receipts for Mobile Environments,” in Proceedings of the 8th Symposium on Identity and Trust on the Internet, (New York, NY, USA), pp. 73–84, ACM, 2009.
[5] L. C. Licher, G., “E-invoicing 2010 - european market guide. euro banking association (eba) and innopay white paper and report,” tech. rep., 2010.
[6] A. Ray, “Progress of electronic invoicing in asia. celent research report. online document - http:// www.celent.com/reports/progress-electronic-invoicing-asia (2010).”
[7] K. H. B. M. Cimander, R., “einvoicing in denmark. technical report,” tech. rep., eGovernment Unit, Information Society and Media Directorate- General, Eurpoean, (2007).
[8] B.Koch,“Einvoicing/e-billingopportunitiesinachallengingmarketenvironment.technicalreport,” tech. rep., Billentis, Switzerland, 2012.
[9] A.Herzberg,“PaymentsandBankingwithMobilePersonalDevices,”CommunicationsoftheACM, vol. 46, pp. 53–58, May 2003.
[10] “Udnnews-issuinge-invoiceneedtouploadontoe-invoiceplatformwithin24hoursbyretails-http:// udn.com/news/finance/fin10/8747431.shtml.”
[11] M.o.F.TaiwanFiscalInformationAgency(FIA),“E-invoicedeliveryspecificationforphysicalchan- nels,” FIA Specification, 2014.
[12] T. Lgoe, D. Coleman, and B. Jepson, Beginning NFC. Near field communication with Anduino, Android & Phonegap, O’Reilly Media, first ed., Jan. 2014.
[13] “Nearfieldcommunicationforum-http://www.nfc-forum.org.”
[14] H.S.-C.T.C.-T.C.W.-K.ChaShi-Cho,ChenJyun-Fu,“Ondesignofsecureapisforiotapplications - using taiwan uniform e-invoice as examples,” vol. Volume 8 of Cryptology and Information Security Series, IOS Press, pp. 9–20, 2012.
[15] Y.-C.T.S.-C.H.G.-H.C.Shi-ChoCha,Yuh-JzerJoungandC.-T.Tseng,“EnsuringtheIntegrityand Non-Repudiation of Remitting E-Invoices in Conventional Channels with Commercially Available NFC Devices,” (Las Vegas, NV, USA), 2014.