Abstract
In this paper we analyze the anonymity of banknote based payments. We show how to model intermediary-chains and present statistical methods that can be used by banks to extract information on the length of the chain from deposited banknotes. If the bank has discovered a chain of length zero, the anonymity of the payment is immediately revoked. To protect against such deanonymizations, customers have to be very careful when spending banknotes.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 30–45. Springer, Heidelberg (2001)
Chaum, D.: Untraceable electronic mail, return adresses and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology – CRYPTO 1982, pp. 199–203. Plenum (1983)
Financial Action Task Force on Money Laundering. The fourty recommendations (2003), Online available at http://www.oecd.org/fatf/
Hitachi μ solutions (2003), Online available at http://www.hitachi-eu.com/mu/
Jakobsson, M.: Mini-cash: A minimalistic approach to e-commerce. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 122–135. Springer, Heidelberg (1999)
Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Shmatikov, V.: Probabilistic analysis of anonymity. In: 15th IEEE Computer Security Foundations Workshop, pp. 119–128. IEEE Computer Society Press, Los Alamitos (2002)
Simon, D.R.: Anonymous communication and anonymous cash. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 61–73. Springer, Heidelberg (1996)
Solms, B.v., Naccache, D.: On blind signatures and perfect crimes. Computers and Security 11(6), 581–583 (1992)
Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Network and Distributed System Security Symposium – NDSS 2002, Internet Society (2002)
Yoshida, J.: Euro bank notes to embed RFID chips by 2005. EE Times (December 2001), Online availabe at http://www.eetimes.com/story/OEG20011219S0016
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kügler, D. (2005). On the Anonymity of Banknotes. In: Martin, D., Serjantov, A. (eds) Privacy Enhancing Technologies. PET 2004. Lecture Notes in Computer Science, vol 3424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11423409_8
Download citation
DOI: https://doi.org/10.1007/11423409_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26203-9
Online ISBN: 978-3-540-31960-3
eBook Packages: Computer ScienceComputer Science (R0)