Skip to main content

A New Offiine Privacy Protecting E-cash System with Revokable Anonymity

  • Conference paper
  • First Online:
Information Security (ISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2433))

Included in the following conference series:

Abstract

Some privacy-protecting electronic payment systems [2],[13], [15],[17] have been proposedto realize the revocable anonymity among users. In this paper, organizing all users into a group, we present a new fair off-line electronic cash system (E-Cash for short). This new E-Cash system is more efficient andmore secure. The system is able of coin tracing ando wner tracing. The anonymity of the system can be revocable under certain conditions by an off-line trusted third authority, the system is untraceable (under normal cases), unlinkable and double-spending resistant. Furthermore, compared with the previous E-Cash systems, our payment protocol is more efficient in computing.

For example, under the cases where there are suspect criminal activities,e.g blackmailing or money laundering

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Brands. Untraceable off-line cash in wallet with observers. In Advances in Cryptology-CRYPTO’93, volume 773 of Lecture Notes in Computer Science, pages 302–318. Springer Verlag, 22–26 August 1993.

    Chapter  Google Scholar 

  2. E. Brickell, P. Gemmell, and D. Kravitz. Trustee-basedtracing extensions to anonymous cash andthe making of anonymous change. In Proceedings of the 6th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 457–466, Jan 1995.

    Google Scholar 

  3. J. Camenisch. Efficient and generalized group signatures. In Advances in Cryptology-EUROCRYPT’ 97, volume 1233 of Lecture Notes in Computer Science, pages 465–479. Springer Verlag, 1997.

    Google Scholar 

  4. J. Camenisch, U.M. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In ESORICS’96, pages 33–43, 1996.

    Google Scholar 

  5. J. Camenisch and M. Michels. A group signature scheme basedon an rsa-variant. BRICS Technical Report RS-98-27(A preliminary version of this paper appeared in Advances in Cryptology-ASIACRYPT’98), Nov 1998.

    Google Scholar 

  6. J. Camenisch and M. Michels. A group signature scheme with improved efficiency. In Advances in Cryptology-ASIACRYPT’98, volume 1514 of Lecture Notes in Computer Science, pages 160–174. Springer Verlag, 1998.

    Chapter  Google Scholar 

  7. J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In Theory and Application of Crypto graphic Techniques, pages 107–122, 1999.

    Google Scholar 

  8. J. Camenisch and M. Stadler. Efficient group signatures for large groups. In Advances in Cryptology-CRYPTO’97, volume 1296 of Lecture Notes in Computer Science, pages 410–424. Springer Verlag, 1997.

    Chapter  Google Scholar 

  9. J. Camenisch, J. Piveteau, and M. Stadler. An efficient payment system protecting privacy. In Computer Security-ESORICS’94, volume 875 of Lecture Notes in Computer Science, pages 207–215. Springer Verlag, 1994.

    Google Scholar 

  10. J. Camenisch, J. Piveteau, and M. Stadler. An efficient fair payment system. In Proc. ACM Conference on Computer and Communications Security, pages 88–94, 1996.

    Google Scholar 

  11. D. Chaum and E. van Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT’91, volume 547 of Lecture Notes in Computer Science, pages 257–265. Springer Verlag, 1991.

    Google Scholar 

  12. L. Chen and T. P. Pedersen. New group signature schemes. In Advances in Cryptology-EUROCRYPT’98-International Conference on the Theory and Application of Crypto graphic Techniques, Proceedings, volume 950 of Lecture Notes in Computer Science, pages 171–181. Springer Verlag, 1994.

    MATH  Google Scholar 

  13. G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung. Anonymity control in E-cash systems. In Financial Cryptography: First International Conference, volume 1318 of Lecture Notes in Computer Science, pages 1–16. Springer Verlag, 1997.

    Google Scholar 

  14. J. Van de Graaf and R. Peralta. A simple andsecure way to show the validity of your public key. In Advances in Cryptology-CRYPTO’87, volume 293 of Lecture Notes in Computer Science, pages 128–134. Springer Verlag, 1988.

    Google Scholar 

  15. Y. Frankel, Y. Tsiounis, and M. Yung. “Indirect discourse proofs”: Achieving efficient fair off-line e-cash. In Advances in Cryptology: Proceedings of ASIA CRYPT 1996, volume 1163 of Lecture Notes in Computer Science, pages 286–300. Springer Verlag, 1996.

    MATH  Google Scholar 

  16. E. Fujisaki and T. Okamoto. Statistical zero-knowledge protocols to prove modular polynomial relations. In Advances in Cryptology-CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 16–30. Springer Verlag, 1997.

    Chapter  Google Scholar 

  17. D. Kügler and H. Vogt. Fair tracing without trustees. In Financial Cryptography-Fifth International Conference, FC’2001 Proceedings, Lecture Notes in Computer Science. Springer Verlag, 2001.

    MATH  Google Scholar 

  18. J.F. Misarsky. A multiplicative attack using lll algorithm on RSA signatures with redundancy. In Advances in Cryptology-CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 231–234. Springer Verlag, 1997.

    Google Scholar 

  19. J.F. Misarsky. How to design RSA signatures schemes. In Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC’98, volume 1431 of Lecture Notes in Computer Science, pages 14–28. Springer Verlag, 1998.

    MATH  Google Scholar 

  20. B. Pfitzmann and A. Sadeghi. Self-escrowedcash against user blackmailing. In Financial Cryptography-Fourth International Conference, FC’2000 Proceedings, volume 1962 of Lecture Notes in Computer Science, pages 42–45. Springer Verlag, 2000.

    MATH  Google Scholar 

  21. D. Pointcheval and J. Stern. Security proofs for signature schemes. In Theory and Application of Crypto graphic Techniques, volume 1070 of Lecture Notes in Computer Science, pages 387–398. Springer Verlag, 1996.

    Google Scholar 

  22. T. Sander and A. Ta-Shma. Auditable, anonymous electronic cash. In Advances in Cryptology-CRYPTO’99-19th Annual International Cryptology Conference, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 555–572. Springer Verlag, 1999.

    MATH  Google Scholar 

  23. M. Stadler, J. Piveteau, and J. Camenisch. Fair blind signatures. In Advances in Cryptology-EUROCRYPT’95, volume 921 of Lecture Notes in Computer Science, pages 209–219. Springer Verlag, 1995.

    Google Scholar 

  24. J. Traoré. Group signature andtheir relevance to privacy-protecting offline electronic cash systems. In ACISP99, volume 1587 of Lecture Notes in Computer Science, pages 228–243. Springer Verlag, 1999.

    Google Scholar 

  25. S. von Solms and D. Naccache. On blind signatures and perfect crime. Computer and Security, 11(6):581–583, 1992.

    Article  Google Scholar 

  26. Bo Yang and Yuming Wang. Fair payment system with electronic wallet. Journal of Computer, 22(8):792–796, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qiu, W., Chen, K., Gu, D. (2002). A New Offiine Privacy Protecting E-cash System with Revokable Anonymity. In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-45811-5_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44270-7

  • Online ISBN: 978-3-540-45811-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics