Abstract
This paper proposes practical escrow cash schemes with the following properties:
-
The privacy of users is preserved, unless all (or a certain portion) of the trustees collaborate.
-
If all (or a certain portion) of the trustees collaborate (for law enforcement or crime prevention), the collaboration can trace the payment history from the payer's (i.e., criminal's) name, and they can also trace the payer's (i.e., criminal's) name from a payment history.
-
Extortion attacks can be partially technically prevented.
-
Each coin is divisible under an off-line payment condition.
Preview
Unable to display preview. Download preview PDF.
References
Brands, S., “Untraceable Off-line Cash in Wallet with Observers”, Proceedings of Crypto 93, pp. 302–318 (1994).
Brands, S., “Restrictive Blinding of Secret-Key Certificates”, Proceedings of Eurocrypt 95, pp. 231–247 (1995).
Brickell, E., Gemmell, P., and Kravitz, D., “Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change”, Proceedings of SODA95, pp. 457–466.
Ben-Or, M., Goldwasser, S., and Wigderson, A., “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation”, Proceeding of STOC88, pp 11–17.
Chaum, D., Crepeau, C., and Damgard, I., “Multiparty Unconditionally Secure Protocol”, Proceeding of STOC88, pp 1–10.
Chaum, D., “Untraceable Electronic Mail, Return Address, and Digital Pseudonyms”, Comm. of the ACM, 24, 2, pp. 84–88 (1981).
Chaum, D., “Blind Signatures for Untraceable Payments”, Proceedings of Crypto 92, pp. 199–203. (1992).
Chaum, D., “Security without Identification: Transaction Systems to Make Big Brother Obsolete,” Comm. of the ACM, 28, 10, pp. 1030–1044 (1985).
Chaum, D., Fiat, A., and Naor, M., “Untraceable Electronic Cash,” Proceedings of Crypto 88, pp. 319–327 (1990).
Camenisch, J., Piveteau, J., and Stadler, M., “Blind Signatures Based on the Discrete Logarithm Problem”, Proceedings of Eurocrypt 94, pp. 428–432 (1994).
Camenisch, J., Piveteau, J., and Stadler, M., “An Efficient Fair Payment System”, Proceedings of 3rd ACM Conference on Computer Communications Security (1996).
Damgård, I., “Practical and Provably Secure Release of a Secret and Exchange of Signatures,” Proceedings of Eurocrypt 93 (1993).
D'amingo, S. and Di Crescenzo, G., “Methodology for Digital Money based on General Cryptographic Tools”, to appear in the Proceedings of Eurocrypt 94.
De Santis, A. and Persiano, G., “Communication Efficient Zero-Knowledge Proofs of Knowledge (with Applications to Electronic Cash)” Proceedings of STACS 92, pp. 449–460 (1992).
Eng, T. and Okamoto, T. “Single-Term Divisible Coins,” to appear in the Proceedings of Eurocrypt 94.
Ferguson, N., “Single Term Off-line Coins”, Proceedings of Eurocrypt 93, pp. 318–328 (1994).
Franklin, M. and Yung, M., “Secure and Efficient Off-Line Digital Money”, Proceedings of ICALP 93, pp. 449–460 (1993).
Goldwasser, S., Micali, S. and Rivest, R., “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,” SIAM J. Comput., 17, 2, pp. 281–308 (1988).
Goldreich, O., Micali, S. and Wiederson, A., “How to play any mental game”, Proceedings of STOC87, pp. 218–229.
Goldreich, O., “Foundations of Cryptography”, Class Notes, Spring 1989.
Hayes, B., “Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash,” Proceedings of Auscrypt 90. pp. 294–305 (1990).
Okamoto, T., and Ohta, K., “Disposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash”, Proceedings of Crypto 89, pp. 481–496 (1990).
Okamoto, T., and Ohta, K., “Universal Electronic Cash”, Proceedings of Crypto 91, pp. 324–337 (1992).
Okamoto, T., “An Efficient Divisible Electronic Cash Scheme”, Proceedings of Crypto 95, pp. 438–451 (1995).
Pailles, J.C., “New Protocols for Electronic Money”, Proceedings of Auscrypt 92, pp. 263–274 (1993).
Pedersen, T. P., “Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing”, Proceedings of Crypto 91, pp. 129–140 (1992).
Shamir, A., “How to share a secret”, Communications of the ACM, v. 24, n.11, Nov 1979, pp. 612–613.
Stadler, M., Piveteau, J., and Camenisch, J., “Fair Blind Signature”, Proceedings of Eurocrypt 95, pp. 209–219 (1995).
Vaudenay, S., “One-Time Identification with Low Memory,” Eurocodes 92 (1992).
von Solms, S., and Naccache, D., “On Blind Signatures and Perfect Crimes”. Computer and Security, 11 (1992) pp 581–583.
Yacobi, Y., “Efficient electronic money”, to appear in the Proceedings of Asiacrypt 94.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fujisaki, E., Okamoto, T. (1997). Practical escrow cash systems. In: Lomas, M. (eds) Security Protocols. Security Protocols 1996. Lecture Notes in Computer Science, vol 1189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-62494-5_3
Download citation
DOI: https://doi.org/10.1007/3-540-62494-5_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-62494-3
Online ISBN: 978-3-540-68047-5
eBook Packages: Springer Book Archive