Skip to main content

An Anonymous Loan System Based on Group Signature Scheme

  • Conference paper
  • First Online:
Book cover Information Security (ISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2433))

Included in the following conference series:

Abstract

Recently, paper based transactions are being replaced by digitized transactions in a rapid pace. These kinds of digitized data are useful compared to paper based data in the sense of the flexibility of the data. Loan services, (for example, Library, Rental video, debt etc., ) are among the services that makes use of sophisticated digitized transactions. Loan services handle a lot of personal information, which enables the analysis of personal hobby and tastes, or even life style. Hence, administrators who control the loan information are able to obtain personal information of customers, which leads to a large privacy problem. We have examined a way to avoid this privacy problem. One solution is to use “An Anonymous Loan” that the user can be anonymous while borrowing and returning, but the anonymity is unveiled only after the due date without return. We will suggest An Anonymous Loan System using tamper resistance device and Group Signature Scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan, V. Shoup, and M. Waidner: Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, vol. 18, pp. 591–610, Apr. 2000.

    Google Scholar 

  2. N. Asokan, M. Schunter, and M. Waidner: Optimistic protocol for fair exchange. Proc. of ACM-CCS’97, pp. 8–17, 1997.

    Google Scholar 

  3. G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, CRYPTO 2000, LNCS 1880. pp. 255–270, 2000.

    Chapter  Google Scholar 

  4. J. Camenisch and I. Damgard: Verifiable Encryption and applications to group signatures and signature sharing. Tech. Rep. RS-98-32, Brics, Department of Computer Science, University of Aarhus, Dec. 1998.

    Google Scholar 

  5. J. Camenisch and A. Lysyanskaya: Efficient Non-transferable Anonymous Multishow Credential System with Optional Anonymity Revocation. Advances in Cryptology-EUROCRYPT2001, vol.1976 of LNCS, pages 331–345, Springer, 2000.

    Google Scholar 

  6. J. Camenisch and M. Michels: A Group Signature Scheme Based on an RSAVarian. Tech. Rep. RS-98-27, Brics, Department of Computer Science, University of Aarhus, 1998.

    Google Scholar 

  7. D. Chaum, R.L. Rivest and A.T. Sherman (Eds.): Blind Signatures for Untraceable Payments, Advances in Cryptology Proceedings of Crypto 82, pp. 199–203, Springar, Plemum, 1983.

    Google Scholar 

  8. D. Chaum: Group Signatures, Advances in Cryptology-EUROCRYPT’ 91, pp. 257–265, Springar, LNCS 547,1991.

    Chapter  Google Scholar 

  9. D. Chaum: Security without Identification: Card Computers to make Big Brother Obsolete, Communications of the ACM, v. 28, n. 10, pp. 1030–1044, Oct 1985.

    Article  Google Scholar 

  10. G. D. Crescenzo, R. Ostrovsky and S. Rajagopalan: Conditional Oblivious Transfer and Timed-Release Encryption. Advances in Cryptology-EUROCRYPT’ 99, pp. 74–89, Springer, LNCS vol. 1592. 1999.

    Chapter  Google Scholar 

  11. T. C. May: Timed-release crypto, Febuary 1993. http://www.hks.net/cpunks/cpunks-0/1460.html.

  12. R. L. Rivest, A. Shamir, and D. A. Wagner: Time-Lock Puzzles and Timed-Release Crypto, http://www.theory.lcs.mit.edu/rivest

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shigetomi, R., Otsuka, A., Ogawa, T., Imai, H. (2002). An Anonymous Loan System Based on Group Signature Scheme. In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-45811-5_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44270-7

  • Online ISBN: 978-3-540-45811-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics