Advanced Search
Volume 24 Issue 11
Nov.  2002
Turn off MathJax
Article Contents
Chen Xiaofeng, Wang Yumin . Fair electronic cash based on untrustworthy trustee[J]. Journal of Electronics & Information Technology, 2002, 24(11): 1566-1572.
Citation: Chen Xiaofeng, Wang Yumin . Fair electronic cash based on untrustworthy trustee[J]. Journal of Electronics & Information Technology, 2002, 24(11): 1566-1572.

Fair electronic cash based on untrustworthy trustee

  • Received Date: 2001-03-30
  • Rev Recd Date: 2001-09-10
  • Publish Date: 2002-11-19
  • A fair electronic cash protocol based on trustee is presented by using RSA blind signature technique in this paper, the identity of multi-spender will be revealed by trustee with very high probability. Contrasting with the previous protocol, the users money cannot be withdrawn unless the trustee is in collusion with the bank, and the trustee can only trace the money that the bank asked him to trace. So the privacy of the user can be ensured to the maximum limit. Also this protocol can be used to trace the dubious cash and the owner, thereby it may be exploited to decrease the crimes like money laundering, blackmailing, etc. in the electronic cash system. This protocol requires off-line participation of trustee when users withdraw the cash, so it is efficient for implementation.
  • loading
  • D. Chaum.[J].Blind Signature for Untraceable Payments, Eurocrypt 82, Plenum Press.1983,:-[2]D. Chaum.[J].A. Fiat, M. Naor, Untraceable Electronic Cash, Crypto 88, LNCS 1000, Berlin,Springer-Verlag.1996,:-[3]S. Brands.[J].Untraceable Off-line Cash in Wallet with Observes, Crypto93, LNCS 773, Springer-Verlag, Berlin.1994,:-[4]B. von Solms, D. Naccache, On blind signatures and perfect crimes, Computers and Security,1992, 11(6), 581-583.[5]E. Brickell, P. Gemmell, D. Kravitz, Trustee-based tracing extension to anonymous cash and the marking of anonymous change, Proc. 6-th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1995, 457-466.M. Stadler.[J].J. M. Piveteau, Jan. Camenisch, Fair blind signatures, Eurocrypt 95, LNCS 921,Springer-Verlag.1995,:-[6]J. Camenisch.[J].U. Maurer, M. Stadle, Digital payment systems with passive anonymity-revoking trustees, Computer Security Esorics 96, LNCS 1146, Springer-Verlag.1996,:-Y. Frankel.[J].Y. Tsiounis, M. Yung, Indirect discourse proofs: Achieving fair off-line E-cash Asiacrypt 96, LNCS 1163, Springer-Verlag.1996,:-[7]A. Juels.[J].Trustee Tokens: Simple and practical anonymous digital coin tracing, Financial Cryptography 99, LNCS 1648, Springer-Verlag.1999,:-[8]G. Davida.[J].Y. Frankel, Y. Tsiounis, M. Yung, Anonymity control in E-cash systems, Financial Cryptography97, LNCS 1318, Springer-Verlag.1997,:-[9]S. Brands.[J].Untraceable off-line cash in wallets with observers, Crypto93, LNCS 839, Berlin,Springer-Verlag.1993,:-[10]Feng Bao.[J].R. H. Deng, A New type of magic ink signature towards transcript-irrelevant anonymity revocation, Asiacrypt98, Springer-Velag.1998,:-[11]B. Pfitzmann.[J].M. Schunter, Asymmetric fingerprinting, Eurocrypt96, LNCS 1070, Berlin,Springer-Verlag.1996,:-[12]T. Sander.[J].A. Ta-Shma, Flow control: A new approach for anonymity control in electronic systems, Financial Cryptography 99, LNCS 1648, Springer-Verlag.1999,:-T. Sander.[J].A. Ta-Shma, Auditable, anonymous electronic cash, Crypto 99, LNCS 1648, Springer-Verlag.1999,:-[13]M. Jackbosson, M. Yung, Revokable and versatile electronic money, In 3rd ACM Conference on Computer and Communications security, India, ACM press, 1996, 76-87.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1988) PDF downloads(471) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return