Skip to main content

Verlusttolerante elektronische Brieftaschen

  • Conference paper

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 147))

Abstract

If a payment system is to be used for payments over a communication network as well as for off-line payments, “electronic wallets” are needed, i.e. tamper-resistant devices guaranteeing the correctness of digital payments. Besides the trustworthiness of the physical security techniques, the main problem with such devices is how to tolerate complete failures or losses, which would imply a loss of money, if no fault tolerance measures were taken. We discuss the possibilities for such fault tolerance measures, taking into account not only the users’ security, but also their privacy, and describe some mechanisms in more detail. The result is that the principle of marked standard value transactions can be used to construct efficient mechanisms providing high fault tolerance and leaving security, anonymity, and autonomy of electronic wallets nearly unchanged.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. S. G. Akl: Digital Signatures: A Tutorial Survey; Computer 16/2 (1983) 15–24.

    Article  Google Scholar 

  2. T. Anderson, P.A. Lee: Fault Tolerance, Principles and Practice; Prentice-Hall International, London 1981.

    Google Scholar 

  3. H. Bürk, A. Pfitzmann: Value transfer systems enabling security and unobservability; IFIP/Sec.’ 86, Proc. 4th Intern. Conf. on Computer Security, Monte Carlo, Dez. 1986, erscheint bei North-Holland, 1987.

    Google Scholar 

  4. D. Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; CACM 28/10 (1985) 1030–1044.

    Google Scholar 

  5. D. E. Denning: Cryptography and Data Security; Addison-Wesley, Reading 1982.

    MATH  Google Scholar 

  6. S. Even, O. Goldreich, Y. Yacobi: Electronic Wallet; Proc. 1984 Intern. Zurich Seminar on Digital Communica — tions, March 1984, Zurich, Swiss Federal Inst. of Technology, IEEE, 199–201.

    Google Scholar 

  7. S. Goldwasser, S. Micali, R. L. Rivest: A “Paradoxical” Solution to the Signature Problem; 25th FOCS, Oct. 1984, IEEE Computer Society, 441-448.

    Google Scholar 

  8. P. Horster: Kryptologie; Reihe Informatik/47, Bibliogr. Institut, Mannheim 1985.

    Google Scholar 

  9. L. A. Levin: One-way functions and pseudorandom generators; 17th STOC, ACM, New York 1985, 363–365.

    Google Scholar 

  10. M. Luby, C. Rackoff: Pseudo random permutation generators and cryptographic composition; 18th STOC, ACM, New York 1986, 356–363.

    Google Scholar 

  11. A. Pfitzmann, B. Pfitzmann, M. Waidner: Technischer Datenschutz in diensteintegrierenden Digitalnetzen — Warum und wie?; DuD Heft 3 (1986) 178-191.

    Google Scholar 

  12. G. M. J. Pluimakers, J. van Leeuwen: Authentication: A Concise Survey; Computers & Security, North-Holland, 5/3 (1986) 243–250.

    Google Scholar 

  13. G. J. Popek, C. S. Kline: Issues in Kernel Design; Operating Systems, An Advanced Course, LNCS 60, Springer-Verlag 1978; nachgedruckt als Springer Study Edition, Springer-Verlag, Heidelberg 1979, 209–227.

    Google Scholar 

  14. A. Pfitzmann, B. Pfitzmann, M. Waidner: Rechtssicherheit trotz Anonymität in offenen digitalen Systemen; erscheint in Computer und Recht (CR) (1987).

    Google Scholar 

  15. K. Rihaczek: Der Stand von OSIS; DuD Heft 4 (1985) 213-217.

    Google Scholar 

  16. F. B. Schneider: Fail-Stop Processors; IEEE Digest of Papers from Spring CompCon’ 83, San Francisco, March 1983, 66-70.

    Google Scholar 

  17. H. Schrenk: Neuartiges Chipkartenkonzept mit dem „Intelligenten” Speicher SLE 4401 K; Siemens telcom report, 9/1 (1986) 88–91.

    Google Scholar 

  18. A. S. Tanenbaum: Computer Networks; Prentice-Hall, Englewood Cliffs 1981.

    Google Scholar 

  19. M. Turoff, S. Chinai: An Electronic Information Marketplace; Computer Networks and ISDN Systems 9/2 (1985) 79–90.

    Article  Google Scholar 

  20. M. Waidner, B. Pfitzmann: Anonyme und verlusttolerante elektronische Brieftaschen; Interner Bericht 1/87 der Fakultät für Informatik, Univ. Karlsruhe 1987.

    Google Scholar 

  21. S. B. Weinstein: Smart credit cards: the answer to cashless shopping; IEEE Spectrum Feb. (1984) 43-49.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1987 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Waidner, M., Pfitzmann, B. (1987). Verlusttolerante elektronische Brieftaschen. In: Belli, F., Görke, W. (eds) Fehlertolerierende Rechensysteme / Fault-Tolerant Computing Systems. Informatik-Fachberichte, vol 147. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45628-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45628-2_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-18294-8

  • Online ISBN: 978-3-642-45628-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics