Abstract

Cross-border trade is also changing and innovating. Electronic payment has become the core application of modern cross-border e-commerce. However, although electronic payment has brought convenience and efficiency to enterprises and social life, there are also many problems in transaction information security. These problems not only hinder the development of electronic payment but also bring hidden dangers to people’s property security. Therefore, an encryption algorithm of e-commerce was proposed, and its algorithm security and risk control mode was further studied by means of case analysis, empirical analysis, and comparative analysis. Experimental data show that blockchain technology is a breakthrough. The aim of the study is to explore its application in specific circumstances and strive to make the new e-payment mode in line with international standards.

1. Introduction

At present, e-commerce has been successfully integrated with many real economy, which is also the most effective transformation direction of the existing traditional business model. With the gradual opening of the concept of market consumption, catering, clothing, and various service industries have made new breakthroughs in the new e-commerce mode. It has changed from the earliest semimanual payment represented by postal bank transfer to the form of online banking separated from manual mode and then to the form of electronic wallet represented by Alipay. Online payment of user experience is developing and improving. At present, e-wallet is undertaking more and more functions. Online investment, online bill making, AA payment, and even online lending are emerging in an endless stream. It can be imagined that online payment tool will soon develop into a rich personal finance online service system [1, 2]. Cross-border e-commerce refers to an international business activity in which transaction subjects belonging to different custom territories reach transactions through an e-commerce platform, conduct e-payment and settlement, and deliver goods through cross-border e-commerce logistics and remote storage, so as to complete the transaction. Cross-border e-commerce is developed based on the network. The network is a media body without boundary, which has the characteristics of globalization and decentralization. Therefore, the cross-border e-commerce attached to the network has the characteristics of globalization and decentralization.

Chen and Wang discussed c-commerce [3]. Here, we construct the existing five-fold classification of e-commerce to adapt to various e-commerce and e-commerce perspectives. Thus, Holsapple and Singh synthesize a complete overall definition of e-commerce. Its definition is to use electronic technology and data processing technology to solve information processing problems in the field of commerce and trade. It reflects the change of an enterprise production process, including resource allocation, production technology innovation, and management virtualization. In order to overcome this problem, Holsapple and Singh put forward a knowledge management viewpoint; the knowledge management is the process of transforming the information obtained from various sources into knowledge and connecting with people, so as to formally manage knowledge. It was clearly recognized that e-commerce is based on electronic knowledge: the process and technology of managing knowledge. Holsapple and Singh argue that the knowledge-oriented e-commerce perspective is beneficial, providing knowledge-based e-commerce in e-organizations [4].

The blockchain finance technology takes literature analysis as the main method and empirical analysis and comparative analysis as the auxiliary method to establish an analysis model, and the optimization mode of cross-border e-commerce payment security by blockchain finance was studied.

2. Research Methods of the Optimization Model

2.1. E-commerce Payment Security Encryption Algorithm

(1) Customer privacy is a necessary condition for blockchain to gain public attention and rapid development [5, 6]. Many encryption technologies are used in blockchain, such as Merkle hash tree, digital signature, and ECC elliptic curve encryption. In essence, encryption technology is a technology that converts the original pure text information into ciphertext information that cannot be understood by some measures and then restores the original pure text information after decryption [7]. The process is shown in Figure 1. The main process is that the sender encrypts the information with an encryption secret key, then transmits it to the receiver, and then restores the information with the decryption key.

A Vigenere receiver is a famous letter. Key and plaintext are converted into corresponding numeric characters 1-92, so the ciphertext space is 92.

Use key to encrypt information:

Use key to decrypt information:

The space-time and space complexity of this algorithm is and .

By increasing the number of characters, we can reduce the frequency of a single letter. The Vigenère cipher library can be changed from 26 characters to alpha QWERTY password [8, 9]. It is just that it uses modulus 92 instead of module 26, and ciphertext C is also extended and harder to crack. After expanding the ciphertext space, the encryption and decryption process is as follows:

Encryption:

Decryption:

In this regard, we improved the above, using LFSR Generate a new key. In addition, this paper also finds a new way to input a short string of characters, and then, the algorithm is obtained:

With the continuous improvement of computing power, various original unsolvable mathematical problems have been gradually overcome. Encryption algorithms are usually generated from mathematical problems, so there are no hard-to-understand encryption methods [10, 11]. By trying all possible keys, detailed methods can break any type of password. The disadvantage is that it requires the highest cost. In the Virginia encryption algorithm, the ciphertext attackers crack the Vigenère password. Therefore, the security of the system can be improved by making the frequency of letters in ciphertext evenly distributed. This method uses a new consecutive key [12, 13] encrypted from the original key. For example, some scholars propose to add random numbers to the ciphertext, which takes up too much space when many messages need to be transmitted safely. Therefore, we propose a new encryption method combining Wigan cipher, LFSR, and OTP, which can make the letters in ciphertext evenly distributed without changing the size of the ciphertext [14, 15].

The curve equation of ellipse is as follows:

The following satisfies formula (8):

Elliptic curve is composed of infinite point and point satisfying formula (6). It can be proven that the known and can easily calculate the value of , while knowing the value of and to calculate the value is very difficult; even for the present, the value of cannot be obtained. It is also the principle of ECC security [16, 17].

2.2. Comparative Analysis

This paper focuses on the application of blockchain technology in the existing cross-border e-commerce payment mode. In the e-commerce payment mode, using blockchain technology is more secure and reliable than the existing supply chain. For enterprises, this mode is implemented efficiently, a decentralized distributed ledger is for the public, and each participant is a node of the blockchain without intermediate transition consumption. This reduces costs [18]. Based on the development of the current e-payment mode, its innovation should first focus on the decentralized distributed theory and establish a distributed ledger [19, 20]. The widely used third-party payment has gradually developed into a wide range of node-connected networks [21, 22]. In this network, all access ports are open to the public, and all participating connections improve the reputation and transparency. The relationship diagram is shown in Figure 2.

The whole distributed network is development of network. Advanced mathematics and encryption methods include not only the sharing and supervision of transaction content but also the control ability of private information. In general, even in the process of transaction, innovative e-payment can save time, space, manpower, and management costs and realize the integration of automation, intelligence, process, and multiple supervision, so as to build a new sharing mode of electronic payment. At present, the electronic sharing mode based on the above analysis needs several characteristics of a core technology to carry out experiments. Through the development of the application of bitcoin technology in the existing electronic payment methods, blockchain technology, as the basis of bitcoin technology, emerges as the times require. The combination of blockchain technology and electronic payment has become a new development opportunity and trend of electronic payment.

2.3. Case Analysis

When introducing the existing supply chain and e-commerce payment system based on blockchain technology, relevant examples are cited. When describing the existing e-commerce payment system, it lists the products of several commercial banks; it also introduces several cases to analyze the current practice of the blockchain platform.

3. Research Design

3.1. Design of the Information Encryption and Decryption Algorithm

The security network payment system performance was evaluated. Figure 3 shows the execution process of the mixed encryption program: (1)A user sends a corresponding private key(2)The JR server passes the public key to encrypt DES generated by itself(3)The user passes the encrypted DES key to the server(4)A secure channel is established in which both the server and the client can interpret each other. The advantage of this is that if missing, it cannot be explained that the DES key is missing. User data cannot be interpreted without the RSA private key required to decrypt. The dual hybrid encryption technology can ensure the security of user data

3.2. Optimization of E-commerce Online Payment Mode

At present, the application of network payment is based on the basic structure and standard of Internet, which involves a wide range of fields from communication protocol to application integration. Therefore, the security measures are mapped to the corresponding levels, which can better describe the online payment security technology system. Generally speaking, the online payment security technology is divided into layers, and the main technical components are shown in Figure 4.

This result is followed by a prefilled message length in 64-bit binary format, because the information length is required in subsequent processing, which will run in four cycles.

Copy the above four uncertainties into the var4o. The main loop has four rounds, each of which is very similar. Sixteen operations were performed in the first round. Data of the function operation are used to operate on the remaining variables, the result of the operation is moved to a random number, and then one of var2, var3, or VAR4 is added to Varl. Finally, replace one of Varl, var2, var3, or VAR4 with this result.

The four functions were explained: if each bit of the three objects , , and of the function operation is independently and evenly distributed, the result of the function operation will also be independent and uniform. If is , then is a bitwise operation; if is , it is otherwise . Function is a bitwise parity operator.

If you enter 123456, el0adc3949ba59abbe56e057f20f883e is encrypted. Therefore, if someone obtains encrypted data, it is difficult to obtain data before encryption.

4. Analysis of Research Results of Blockchain Finance on Cross-Border E-commerce Payment Security

4.1. Process Optimization Analysis of the Cross-Border E-commerce Payment Gateway

For system implementation, this paper first defines the data object and database storage table and implements the data persistence method in the system framework. In addition, the payment gateway downstream of the system defines the abstract protocol interface of the payment gateway. The interface uniformly describes the remote call function to be connected when adding a payment gateway. Through this hierarchical division, the integrated system can be decoupled, updated, debugged, or replaced, which is much easier than the strong coupling mode. It can also effectively reduce file conflicts in the process of code writing by multiple team members. Different payment gateways can be implemented at the same time to improve team efficiency. The payment process object, which represents a single transaction request, includes two types: payment and refund. The payment process is the core object in the payment module, and some of its properties are shown in Table 1.

A payment process object, which is the subordinate object of the payment process, is used to record the step details of interactive processing of the payment method. It is not directly oriented to payment business but mainly provides help for technical personnel in fault diagnosis. At the same time, it also has a certain auxiliary audit function. Its attributes are shown in Table 2.

In the e-commerce payment system, a sequence diagram is one of the dynamic views to describe business scenarios. In this paper, we use a sequence diagram to describe the payment process and make state parameter pattern analysis.

In all online payment businesses, the core content is the payment process, which is directly related to the department and unifies the logical rationality and fluency of business processing. The specific payment process of the payment gateway system is shown in Figure 5.

(1) Users browse the goods on the websites of merchants and enterprises, and then put them into the shopping cart and execute the corresponding unified order procedures. (2) Enterprises fill in and place orders according to the purchase requests sent by customers and send the payment request information to the payment transaction network system. (3) The payment transaction network system checks the effectiveness of merchants and verifies the payment request information and then passes through the persistence layer. Store the order information and transaction information in the database. (4) Check whether the merchant request contains the third-party platform channel information; if so, submit the order information to the page in the browser. (5) Provide the third-party platform list and order information to the customer, and the customer can choose the payment institution independently. (6) Submit the payment transaction request and send it to the network system. (7) Update the order information. (8) Submit the updated order information to the corresponding third-party platform, and display the payment page of the third-party platform through the browser. (9) Return to the payment page. (10) Fill in the account information and submit after confirmation. (11) Process the payment information through the background server of the third-party platform and generate the payment result information. The payment transaction network system processes the returned results from the third-party platform, updates the order list, and sends the payment result information to merchants and customers. The technical implementation of the system is a comprehensive process combining macrodesign with specific details, and it can complete the best integration with the payment module. According to the business requirements of the upstream business system, some unnecessary functions can be deleted. Coordinate and optimize the whole system to improve the overall efficiency.

The most important change of electronic payment based on blockchain is the change of the payment process based on tripartite and decentralization. The centralized payment process is shown in Figure 6.

From the above process, we can see that although the whole payment transaction process is between the buyer and the seller, the key steps are completed in the third party. At present, this kind of transaction process is widely used because of the position advantage of the third party; that is to say, no matter whether there are problems in any link of the transaction process, the buyer and the seller can provide solutions through the mutual trust of the third party platform to achieve the ultimate win-win situation.

4.2. Performance Analysis of the Payment Security Algorithm

In order to compare the efficiency of the improved DES and RSA generation algorithm and the original algorithm by using blockchain technology, this paper adopts the method of calling the server side from the Fabric-CA client which, respectively, uses the improved DES and RSA generation algorithm. Each data is the average value of twenty groups of data excluding extreme values under the same variable. As shown in Figure 7, the generation time of the original generation scheme and the improved scheme is compared.

As shown in Figure 8, because a very short key can generate a long period, as long as the period length of the new key is larger than the plaintext length, the length of the original key has little effect on the final ciphertext frequency distribution. Therefore, in the period range, the original key with short length can be selected to save the resource consumption during transmission. We further compare the two encryption algorithms through data analysis. Compared with the traditional algorithm, the new algorithm has a smaller letter coincidence index. This paper first summarizes on this basis the process of using the concept of blockchain finance to improve DES and RSA generation algorithm and optimize the security payment process and explains the reason and purpose of this chapter to improve the algorithm. This paper introduces the workflow and improvement direction of the DES and RSA generation algorithm, puts forward specific improvement measures, and explains the effect of improvement through data and chart analysis. It is secure in frequency analysis attacks. At the same time, in our proposed algorithm, the original key with short length can reduce and can increase the key period nonlinearly. In addition, we try to expand the ciphertext space.

The reason why the cross-border e-commerce payment mode with blockchain technology can improve the efficiency is that the distributed data structure ensures that all users in the supply chain have equal rights in information acquisition. Blockchain is similar to a distributed bookkeeping book. Each subject in the chain is at the same level, and the third-party platform of banking is no longer responsible for bridging the lead for the intermediate contact. In the distributed structure, digital signature enables all users to obtain common information, and everyone knows the situation of all traders, which improves the payment efficiency and ensures the security. Banks do not need to rely on the intermediate core enterprises as supervisors to inquire about the actual situation past, which saves time cost and human resources.

5. Conclusions

Based on blockchain, this payment method is still in its infancy, and it is also facing technical challenges and traditional concept challenges. However, the progress of blockchain technology application itself is relatively slow, and the application of cross-border electronic payment needs to be improved and developed. There is still a gap in technical factors. There are still many aspects to be improved and discussed, including some other factors that may have an important impact on it, such as network delay in the process of encryption and authentication, information transmission, and storage problems between modules, and block capacity is also an uncertain factor. In order to achieve efficient transaction and payment, we need to further improve the information system to achieve high-level requirements.

Starting from the concept of e-commerce and payment platform-related business, this paper combs and analyzes the development of payment platform business domestically and internationally. On this basis, it improves the payment security algorithm of the e-commerce payment platform from various aspects, optimizes the traditional payment process, and discusses several typical payment models. On this basis, the concept of blockchain finance is introduced and applied to the security optimization of payment mode. The payment security algorithm and payment process are improved and optimized.

Generally speaking, international exchanges are constantly strengthening, international trade is growing, and cross-border e-commerce is developing rapidly. However, in today’s changing social and economic status, not only is cross-border e-commerce always facing opportunities and challenges but also cross-border e-payment mode needs to be constantly innovated with the changes of the times. Blockchain technology has brought new development opportunities for cross-border electronic payment mode, which is not only the progress of technology but also the needs of the times.

Data Availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.