Abstract
Credit card system has proven itself to be a convenient way for individuals to complete transactions. Despite its great benefits, credit card system also brings in great privacy risks to users. The card issuing bank knows the details of all transactions made by every user, including transaction date, amount, and merchant. These contain sensitive information of the users which may reveal their whereabouts, preferences, daily routines, etc. In this paper, we build privacy preserving credit card systems that hide the expenses of individual users from the bank, while preserving most of the features provided by the current credit card system at the same time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abe, M., Chow, S.S.M., Haralambiev, K., Ohkubo, M.: Double-trapdoor anonymous tags for traceable signatures. Int. J. Inf. Secur. 12(1), 19–31 (2013)
Androulaki, E., Bellovin, S.M.: An anonymous credit card system. In: Proceedings of 6th Inernational Conference on Trust, Privacy and Security in Digital Business, TrustBus 2009, Linz, Austria, 3–4 September 2009, pp. 42–51 (2009)
Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: State of the art in electronic payment systems. Adv. Comput. 53, 425–449 (2000)
Au, M.H., Chow, S.S.M., Susilo, W.: Short e-cash. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 332–346. Springer, Heidelberg (2005). doi:10.1007/11596219_27
Baldimtsi, F., Chase, M., Fuchsbauer, G., Kohlweiss, M.: Anonymous transferable e-cash. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 101–124. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46447-2_5
Bellare, M., Garay, J.A., Hauser, R.C., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M.: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4), 611–627 (2000)
Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: the case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30574-3_11
Blazy, O., Canard, S., Fuchsbauer, G., Gouget, A., Sibert, H., Traoré, J.: Achieving optimal anonymity in transferable e-cash with a judge. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 206–223. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21969-6_13
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: 20th ACM STOC, Chicago, Illinois, USA, 2–4 May 1988, pp. 103–112. ACM Press (1988)
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C.: Short accountable ring signatures based on DDH. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 243–265. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24174-6_13
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302–321. Springer, Heidelberg (2005). doi:10.1007/11426639_18
Canard, S., Gouget, A.: Anonymity in transferable e-cash. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 207–223. Springer, Heidelberg (2008). doi:10.1007/978-3-540-68914-0_13
Capgemini, Royal Bank of Scotland. World payments report (2015). https://www.fr.capgemini-consulting.com/resource-file-access/resource/pdf/world_payments_report_2015_vfinal.pdf. Accessed 18 July 2016
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.), CRYPTO 1982, Santa Barbara, CA, USA, pp. 199–203. Plenum Press, New York (1982)
Chow, S.S.M.: Running on karma – P2P reputation and currency systems. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 146–158. Springer, Heidelberg (2007). doi:10.1007/978-3-540-76969-9_10
Chow, S.S.M.: Real traceable signatures. In: Knudsen, L.R., Wu, H. (eds.) SAC 2009. LNCS, vol. 5867, pp. 92–107. Springer, Heidelberg (2009). doi:10.1007/978-3-642-05445-7_6
Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable constant-size fair e-cash. In: Reiter, M., Naccache, D. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226–247. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10433-6_15
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)
Krawczyk, H.: Blinding of credit card numbers in the SET protocol. In: Hirschfeld, R. (ed.) FC 1999. LNCS, vol. 1648, pp. 17–28. Springer, Heidelberg (1999). doi:10.1007/3-540-48390-X_2
Lai, R.W.F., Zhang, T., Chow, S.S.M., Schröder, D.: Efficient sanitizable signatures without random oracles. In: Proceedings of Computer Security - ESORICS 2016–21st European Symposium on Research in Computer Security, Heraklion, Crete, Greece, 28–30 September 2016 (2016, to appear)
Low, S.H., Paul, S., Maxemchuk, N.F.: Anonymous credit cards. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, CCS 1994, Fairfax, Virginia, USA, 2–4 November 1994, pp. 108–117 (1994)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Okamoto, T., Ohta, K.: Disposable zero-knowledge authentications and their applications to untraceable electronic cash. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435. Springer, Heidelberg (1990)
Okamoto, T., Ohta, K.: Universal electronic cash. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 324–337. Springer, Heidelberg (1992). doi:10.1007/3-540-46766-1_27
Tewari, H., Hughes, A.: Fully anonymous transferable ecash. IACR Cryptology ePrint Archive 2016:107 (2016)
Acknowledgments
Sherman Chow is supported by the Early Career Award and the Early Career Scheme (CUHK 439713), and General Research Funds (CUHK 14201914) of the Research Grants Council, University Grant Committee of Hong Kong.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Chow, S.S.M., Lai, R.W.F., Wang, X., Zhao, Y. (2016). Privacy Preserving Credit Systems. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds) Network and System Security. NSS 2016. Lecture Notes in Computer Science(), vol 9955. Springer, Cham. https://doi.org/10.1007/978-3-319-46298-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-46298-1_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46297-4
Online ISBN: 978-3-319-46298-1
eBook Packages: Computer ScienceComputer Science (R0)