Skip to main content

A Practical Approach Defeating Blackmailing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2384))

Abstract

To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently Kügler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.

This work was supported by both Ministry of Information and Communication and Korea Information Security Agency, Korea, under project 2002-130

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Camenisch, U. Mauer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees., In Computer Security-ESORICS ‘96, volume 1146 of Lecture Notes in Computer Scienc, pages 31–43. Springer-Verlag, 1996.

    Google Scholar 

  2. G. Davide, Y, Tsiounis, and M. Young. Anonymity control in e-cash systems., In Financial Cryptography’ 97, volume 1318 of Lecture Notes in Computer Science, pages 1–16. Springer-Verlag, 1997.

    Google Scholar 

  3. Y. Frankel, Y. Tsiounis, and M. Young. ”Indirect discourse proofs”; Achieving efficient fair off-line e-cash., In Advances in Cryptology-ASIACRYPT ‘96, volume 1163 of Lecture Notes in Computer Science, pages 286–300. Springer-Verlag, 1996.

    Chapter  Google Scholar 

  4. M. Jakobsson and M. Yung. Revokable and versatile electronic money. In 3rd ACM Conference on Computer Communication Security (CCCS’ 96), pages 76–87. ACM Press, 1996.

    Google Scholar 

  5. M. Jakobsson and M. Yung. Distributed ”magic ink” signatures. In Advances in Cryptology-EUROCRYPT’ 97, volume 1233 of Lecture Notes in Computer Science, pages 450–464. Springer-Verlag, 1997.

    Google Scholar 

  6. D. Kügler and H. Vogt. Marking: A Privacy Protecting Approach Against Blackmailing., Proceedings PKC 2001, LNCS 1992, Springer-Verlag, 2001, 137–152.

    Google Scholar 

  7. A.K. Lenstra, E.R. Verheul, The XTR public key system., Proceedings of Crypto 2000, LNCS 1880,Springer-Verlag, 2000, 1–19; available from www.ecstr.com.

    Google Scholar 

  8. A.K. Lenstra, E.R. Verheul, Key improvements to XTR Proceedings of Asiacrypt 2000, LNCS 1976, Springer-Verlag, 2000, 220–233; available from www.ecstr.com.

    Chapter  Google Scholar 

  9. B. von Solms and D. Naccache. On blind signatures and perfect crimes., Computers and Security, 11(6):581–583, 1992.

    Article  Google Scholar 

  10. M. Stadler. Cryptographic Protocols for Revokable Privacy. PhD Thesis, ETH No. 11651, Swiss Federal Institute of Technology, Zurich, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, DG., Park, HY., Park, YH., Lee, S., Lee, D.H., Yang, HJ. (2002). A Practical Approach Defeating Blackmailing. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_35

Download citation

  • DOI: https://doi.org/10.1007/3-540-45450-0_35

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43861-8

  • Online ISBN: 978-3-540-45450-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics