Abstract
Some privacy-protecting electronic payment systems [2],[13], [15],[17] have been proposedto realize the revocable anonymity among users. In this paper, organizing all users into a group, we present a new fair off-line electronic cash system (E-Cash for short). This new E-Cash system is more efficient andmore secure. The system is able of coin tracing ando wner tracing. The anonymity of the system can be revocable under certain conditions by an off-line trusted third authority, the system is untraceable (under normal cases), unlinkable and double-spending resistant. Furthermore, compared with the previous E-Cash systems, our payment protocol is more efficient in computing.
For example, under the cases where there are suspect criminal activities,e.g blackmailing or money laundering
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Brands. Untraceable off-line cash in wallet with observers. In Advances in Cryptology-CRYPTO’93, volume 773 of Lecture Notes in Computer Science, pages 302–318. Springer Verlag, 22–26 August 1993.
E. Brickell, P. Gemmell, and D. Kravitz. Trustee-basedtracing extensions to anonymous cash andthe making of anonymous change. In Proceedings of the 6th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 457–466, Jan 1995.
J. Camenisch. Efficient and generalized group signatures. In Advances in Cryptology-EUROCRYPT’ 97, volume 1233 of Lecture Notes in Computer Science, pages 465–479. Springer Verlag, 1997.
J. Camenisch, U.M. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In ESORICS’96, pages 33–43, 1996.
J. Camenisch and M. Michels. A group signature scheme basedon an rsa-variant. BRICS Technical Report RS-98-27(A preliminary version of this paper appeared in Advances in Cryptology-ASIACRYPT’98), Nov 1998.
J. Camenisch and M. Michels. A group signature scheme with improved efficiency. In Advances in Cryptology-ASIACRYPT’98, volume 1514 of Lecture Notes in Computer Science, pages 160–174. Springer Verlag, 1998.
J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In Theory and Application of Crypto graphic Techniques, pages 107–122, 1999.
J. Camenisch and M. Stadler. Efficient group signatures for large groups. In Advances in Cryptology-CRYPTO’97, volume 1296 of Lecture Notes in Computer Science, pages 410–424. Springer Verlag, 1997.
J. Camenisch, J. Piveteau, and M. Stadler. An efficient payment system protecting privacy. In Computer Security-ESORICS’94, volume 875 of Lecture Notes in Computer Science, pages 207–215. Springer Verlag, 1994.
J. Camenisch, J. Piveteau, and M. Stadler. An efficient fair payment system. In Proc. ACM Conference on Computer and Communications Security, pages 88–94, 1996.
D. Chaum and E. van Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT’91, volume 547 of Lecture Notes in Computer Science, pages 257–265. Springer Verlag, 1991.
L. Chen and T. P. Pedersen. New group signature schemes. In Advances in Cryptology-EUROCRYPT’98-International Conference on the Theory and Application of Crypto graphic Techniques, Proceedings, volume 950 of Lecture Notes in Computer Science, pages 171–181. Springer Verlag, 1994.
G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung. Anonymity control in E-cash systems. In Financial Cryptography: First International Conference, volume 1318 of Lecture Notes in Computer Science, pages 1–16. Springer Verlag, 1997.
J. Van de Graaf and R. Peralta. A simple andsecure way to show the validity of your public key. In Advances in Cryptology-CRYPTO’87, volume 293 of Lecture Notes in Computer Science, pages 128–134. Springer Verlag, 1988.
Y. Frankel, Y. Tsiounis, and M. Yung. “Indirect discourse proofs”: Achieving efficient fair off-line e-cash. In Advances in Cryptology: Proceedings of ASIA CRYPT 1996, volume 1163 of Lecture Notes in Computer Science, pages 286–300. Springer Verlag, 1996.
E. Fujisaki and T. Okamoto. Statistical zero-knowledge protocols to prove modular polynomial relations. In Advances in Cryptology-CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 16–30. Springer Verlag, 1997.
D. Kügler and H. Vogt. Fair tracing without trustees. In Financial Cryptography-Fifth International Conference, FC’2001 Proceedings, Lecture Notes in Computer Science. Springer Verlag, 2001.
J.F. Misarsky. A multiplicative attack using lll algorithm on RSA signatures with redundancy. In Advances in Cryptology-CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 231–234. Springer Verlag, 1997.
J.F. Misarsky. How to design RSA signatures schemes. In Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC’98, volume 1431 of Lecture Notes in Computer Science, pages 14–28. Springer Verlag, 1998.
B. Pfitzmann and A. Sadeghi. Self-escrowedcash against user blackmailing. In Financial Cryptography-Fourth International Conference, FC’2000 Proceedings, volume 1962 of Lecture Notes in Computer Science, pages 42–45. Springer Verlag, 2000.
D. Pointcheval and J. Stern. Security proofs for signature schemes. In Theory and Application of Crypto graphic Techniques, volume 1070 of Lecture Notes in Computer Science, pages 387–398. Springer Verlag, 1996.
T. Sander and A. Ta-Shma. Auditable, anonymous electronic cash. In Advances in Cryptology-CRYPTO’99-19th Annual International Cryptology Conference, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 555–572. Springer Verlag, 1999.
M. Stadler, J. Piveteau, and J. Camenisch. Fair blind signatures. In Advances in Cryptology-EUROCRYPT’95, volume 921 of Lecture Notes in Computer Science, pages 209–219. Springer Verlag, 1995.
J. Traoré. Group signature andtheir relevance to privacy-protecting offline electronic cash systems. In ACISP99, volume 1587 of Lecture Notes in Computer Science, pages 228–243. Springer Verlag, 1999.
S. von Solms and D. Naccache. On blind signatures and perfect crime. Computer and Security, 11(6):581–583, 1992.
Bo Yang and Yuming Wang. Fair payment system with electronic wallet. Journal of Computer, 22(8):792–796, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qiu, W., Chen, K., Gu, D. (2002). A New Offiine Privacy Protecting E-cash System with Revokable Anonymity. In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_13
Download citation
DOI: https://doi.org/10.1007/3-540-45811-5_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44270-7
Online ISBN: 978-3-540-45811-1
eBook Packages: Springer Book Archive