Skip to main content

Privacy Preserving Credit Systems

  • Conference paper
  • First Online:
Network and System Security (NSS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9955))

Included in the following conference series:

Abstract

Credit card system has proven itself to be a convenient way for individuals to complete transactions. Despite its great benefits, credit card system also brings in great privacy risks to users. The card issuing bank knows the details of all transactions made by every user, including transaction date, amount, and merchant. These contain sensitive information of the users which may reveal their whereabouts, preferences, daily routines, etc. In this paper, we build privacy preserving credit card systems that hide the expenses of individual users from the bank, while preserving most of the features provided by the current credit card system at the same time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abe, M., Chow, S.S.M., Haralambiev, K., Ohkubo, M.: Double-trapdoor anonymous tags for traceable signatures. Int. J. Inf. Secur. 12(1), 19–31 (2013)

    Article  Google Scholar 

  2. Androulaki, E., Bellovin, S.M.: An anonymous credit card system. In: Proceedings of 6th Inernational Conference on Trust, Privacy and Security in Digital Business, TrustBus 2009, Linz, Austria, 3–4 September 2009, pp. 42–51 (2009)

    Google Scholar 

  3. Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: State of the art in electronic payment systems. Adv. Comput. 53, 425–449 (2000)

    Article  Google Scholar 

  4. Au, M.H., Chow, S.S.M., Susilo, W.: Short e-cash. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 332–346. Springer, Heidelberg (2005). doi:10.1007/11596219_27

    Chapter  Google Scholar 

  5. Baldimtsi, F., Chase, M., Fuchsbauer, G., Kohlweiss, M.: Anonymous transferable e-cash. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 101–124. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46447-2_5

    Google Scholar 

  6. Bellare, M., Garay, J.A., Hauser, R.C., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M.: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4), 611–627 (2000)

    Article  Google Scholar 

  7. Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: the case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30574-3_11

    Google Scholar 

  8. Blazy, O., Canard, S., Fuchsbauer, G., Gouget, A., Sibert, H., Traoré, J.: Achieving optimal anonymity in transferable e-cash with a judge. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 206–223. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21969-6_13

    Chapter  Google Scholar 

  9. Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: 20th ACM STOC, Chicago, Illinois, USA, 2–4 May 1988, pp. 103–112. ACM Press (1988)

    Google Scholar 

  10. Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C.: Short accountable ring signatures based on DDH. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 243–265. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24174-6_13

    Chapter  Google Scholar 

  11. Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302–321. Springer, Heidelberg (2005). doi:10.1007/11426639_18

    Chapter  Google Scholar 

  12. Canard, S., Gouget, A.: Anonymity in transferable e-cash. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 207–223. Springer, Heidelberg (2008). doi:10.1007/978-3-540-68914-0_13

    Chapter  Google Scholar 

  13. Capgemini, Royal Bank of Scotland. World payments report (2015). https://www.fr.capgemini-consulting.com/resource-file-access/resource/pdf/world_payments_report_2015_vfinal.pdf. Accessed 18 July 2016

  14. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.), CRYPTO 1982, Santa Barbara, CA, USA, pp. 199–203. Plenum Press, New York (1982)

    Google Scholar 

  15. Chow, S.S.M.: Running on karma – P2P reputation and currency systems. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 146–158. Springer, Heidelberg (2007). doi:10.1007/978-3-540-76969-9_10

    Chapter  Google Scholar 

  16. Chow, S.S.M.: Real traceable signatures. In: Knudsen, L.R., Wu, H. (eds.) SAC 2009. LNCS, vol. 5867, pp. 92–107. Springer, Heidelberg (2009). doi:10.1007/978-3-642-05445-7_6

    Chapter  Google Scholar 

  17. Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable constant-size fair e-cash. In: Reiter, M., Naccache, D. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226–247. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10433-6_15

    Chapter  Google Scholar 

  18. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  19. Krawczyk, H.: Blinding of credit card numbers in the SET protocol. In: Hirschfeld, R. (ed.) FC 1999. LNCS, vol. 1648, pp. 17–28. Springer, Heidelberg (1999). doi:10.1007/3-540-48390-X_2

    Chapter  Google Scholar 

  20. Lai, R.W.F., Zhang, T., Chow, S.S.M., Schröder, D.: Efficient sanitizable signatures without random oracles. In: Proceedings of Computer Security - ESORICS 2016–21st European Symposium on Research in Computer Security, Heraklion, Crete, Greece, 28–30 September 2016 (2016, to appear)

    Google Scholar 

  21. Low, S.H., Paul, S., Maxemchuk, N.F.: Anonymous credit cards. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, CCS 1994, Fairfax, Virginia, USA, 2–4 November 1994, pp. 108–117 (1994)

    Google Scholar 

  22. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  23. Okamoto, T., Ohta, K.: Disposable zero-knowledge authentications and their applications to untraceable electronic cash. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435. Springer, Heidelberg (1990)

    Google Scholar 

  24. Okamoto, T., Ohta, K.: Universal electronic cash. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 324–337. Springer, Heidelberg (1992). doi:10.1007/3-540-46766-1_27

    Google Scholar 

  25. Tewari, H., Hughes, A.: Fully anonymous transferable ecash. IACR Cryptology ePrint Archive 2016:107 (2016)

    Google Scholar 

Download references

Acknowledgments

Sherman Chow is supported by the Early Career Award and the Early Career Scheme (CUHK 439713), and General Research Funds (CUHK 14201914) of the Research Grants Council, University Grant Committee of Hong Kong.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongjun Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Chow, S.S.M., Lai, R.W.F., Wang, X., Zhao, Y. (2016). Privacy Preserving Credit Systems. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds) Network and System Security. NSS 2016. Lecture Notes in Computer Science(), vol 9955. Springer, Cham. https://doi.org/10.1007/978-3-319-46298-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46298-1_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46297-4

  • Online ISBN: 978-3-319-46298-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics