Skip to main content

Security Aspects of the Ecash™ Payment System

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1528))

Abstract

Ecash is a payment system designed and implemented for making purchases over open networks such as the Internet. In this paper we review the main cryptographic techniques used throughout the ecash system. We will focus on security aspects as well as some performance related issues. The central notion of an electronic coin is treated in detail, and the basic protocols manipulating coins are described.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1:239–248, 1983.

    Article  Google Scholar 

  2. J.-P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. MjØlsnes, F. Muller, T. Pedersen, B. Pfitzmann, P. de Rooij, B. Schoenmakers, M. Schunter, L. Vallée, and M. Waidner. The ESPRIT Project CAFE-High Security Digital Payment Systems. In Computer Security-ESORICS 94, volume 875 of Lecture Notes in Computer Science, pages 217–230, Berlin, 1994. Springer-Verlag.

    Google Scholar 

  3. + 95] M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, and M. Waidner. iKP — a family of secure electronic payment protocols. In First USENIX Workshop on Electronic Commerce, 1995.

    Google Scholar 

  4. S. Brands. Untraceable off-line cash in wallet with observers. In Advances in Cryptology-CRYPTO ‘93, volume 773 of Lecture Notes in Computer Science, pages 302–318, Berlin, 1994. Springer-Verlag.

    Google Scholar 

  5. S. Brands. Off-line cash transfer by smart cards. In V. Cordonnier and J.-J. Quisquater, editors, Proceedings First Smart Card Research and Advanced Application Conference, pages 101–117, 1994. Also as report CS-R9455, Centrum voor Wiskunde en Informatica.

    Google Scholar 

  6. D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology-CRYPTO ‘88, volume 403 of Lecture Notes in Computer Science, pages 319–327, Berlin, 1990. Springer-Verlag.

    Google Scholar 

  7. D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R.L. Rivest, and A.T. Sherman, editors, Advances in Cryptology-CRYPTO ‘82, pages 199–203, New York, 1983. Plenum Press.

    Google Scholar 

  8. D. Chaum. Online cash checks. In Advances in Cryptology-EUROCRYPT ‘89, volume 434 of Lecture Notes in Computer Science, pages 288–293, Berlin, 1990. Springer-Verlag.

    Google Scholar 

  9. D. Chaum. Achieving electronic privacy. Scientific American, pages 96–101, August 1992.

    Google Scholar 

  10. J.-H. Evertse and E. van Heyst. Which new RSA-signatures can be computed from certain given RSA-signatures? Journal of Cryptology, 5(1):41–52, 1992.

    Article  MATH  MathSciNet  Google Scholar 

  11. J.-H. Evertse and E. van Heyst. Which new RSA-signatures can be computed from RSA-signatures, obtained in a specific interactive protocol? In Advances in Cryptology-EUROCRYPT ‘92, volume 658 of Lecture Notes in Computer Science, pages ??-??, Berlin, 1993. Springer-Verlag.

    Chapter  Google Scholar 

  12. N. Ferguson. Single term off-line coins. In Advances in Cryptology—EUROCRYPT ‘93, volume 765 of Lecture Notes in Computer Science, pages 318–328, Berlin, 1994. Springer-Verlag.

    Google Scholar 

  13. M. Franklin and M. Yung. Secure and efficient off-line digital money. In Automata, Languages and Programming, ICALP 93, volume 700 of Lecture Notes in Computer Science, pages 265–276, Berlin, 1993. Springer-Verlag.

    Google Scholar 

  14. B. Schoenmakers. An efficient electronic payment system withstanding parallel attacks. Report CS-R9522, Centrum voor Wiskunde en Informatica, March 1995.

    Google Scholar 

  15. A. Shamir. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, 1:38–44, 1983.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schoenmakers, B. (1998). Security Aspects of the Ecash™ Payment System. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-49248-8_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65474-2

  • Online ISBN: 978-3-540-49248-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics