Skip to main content

Retrofitting Fairness on the Original RSA-Based E-cash

  • Conference paper
Financial Cryptography (FC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2742))

Included in the following conference series:

  • 1114 Accesses

Abstract

The notion of fair e-cash schemes was suggested and implemented in the last decade. It balances anonymity with the capability of tracing users and transactions in cases of crime or misbehavior. The issue was raised both, in the banking community and in the cryptographic literature. A number of systems were designed with an off-line fairness, where the tracing authorities get involved only when tracing is needed. However, none of them is based on the original RSA e-cash. Thus, an obvious question is whether it is possible to construct an efficient fair e-cash scheme by retrofitting the fairness mechanism on the original RSA-based scheme. The question is interesting from, both, a practical perspective (since investment has been put in developing software and hardware that implement the original scheme), and as a pure research issue (since retrofitting existing protocols with new mechanisms is, at times, harder than designing solutions from scratch). In this paper, we answer this question in the affirmative by presenting an efficient fair off-line e-cash scheme based on the original RSA-based one.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Rogaway, P.: Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. In: ACM CCS 1993 (1993)

    Google Scholar 

  2. Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, p. 309. Springer, Heidelberg (2002)

    Google Scholar 

  3. Brickell, E., Gemmell, P., Kravitz, D.: Trustee-based Tracing Extentions to Anonymous Cash and the Making of Anonymous Change. In: SODA 1995 (1995)

    Google Scholar 

  4. Chaum, D.: Blind Signatures for Untraceable Payments. In: Crypto 1982 (1982)

    Google Scholar 

  5. Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  6. Camenisch, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trusrees. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146. Springer, Heidelberg (1996)

    Google Scholar 

  7. Chaum, D., Pedersen, T.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  8. El Gamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm. IEEE Trans. IT 31(4), 469–472 (1985)

    Article  MATH  Google Scholar 

  9. Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: FOCS 1987 (1987)

    Google Scholar 

  10. Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  11. Frankel, Y., Tsiounis, Y., Yung, M.: Indirect Discourse Proofs: Achieving Efficient Fair Off-Line E-Cash. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163. Springer, Heidelberg (1996)

    Google Scholar 

  12. Franklin, M., Reiter, M.: Verifiable Signature Scharing. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 50–63. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  13. Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 295. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  14. Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure against Adaptive Chosen-message Attacks. SIAM J. Computing 17(2) (1988)

    Google Scholar 

  15. Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game- A Completeness Theorem for Protocol with Honest Majority. In: STOC 1987 (1987)

    Google Scholar 

  16. Jarecki, S., Lysyanskaya, A.: Concurrent and Erasure-Free Models in Adaptively-Secure Threshold Cryptography. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 221. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  17. Jakobsson, M., Mueller, J.: Improved Magic Ink Signatures Using Hints. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, p. 253. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  18. Jakobsson, M., Yung, M.: Revokable and Versatile Electronic Money. In: ACM CCS 1996 (1996)

    Google Scholar 

  19. Juels, A.: Trustee Tokens: Simple and Practical Tracing of Anonymous Digital Cash. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, p. 29. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  20. M’Raihl, D., Pointcheval, D.: Distributed Trustees and Revocability: A Framework for Internet Payment. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 28–42. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  21. Pedersen, T.P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  22. Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. J. of Cryptology 13(3) (2000)

    Google Scholar 

  23. Rabin, T.: A Simplified Approach to Threshold and Proactive RSA. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 89. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  24. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. CACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  25. Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 207. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  26. Tsiounis, Y., Yung, M.: On the Security of ElGamal Based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, p. 117. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  27. von Solms, S., Naccache, D.: On Blind Signatures and Perfect Crimes. Computer and Security 11, 581–583 (1992)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, S., Yung, M. (2003). Retrofitting Fairness on the Original RSA-Based E-cash. In: Wright, R.N. (eds) Financial Cryptography. FC 2003. Lecture Notes in Computer Science, vol 2742. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45126-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45126-6_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40663-1

  • Online ISBN: 978-3-540-45126-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics