On the design of efficient RSA-based off-line electronic cash schemes

被引:12
作者
Varadharajan, V [1 ]
Nguyen, KQ [1 ]
Mu, Y [1 ]
机构
[1] Univ Western Sydney Nepean, Sch Comp & IT, Kingswood, NSW 747, Australia
关键词
cryptography; electronic cash; RSA-based protocols;
D O I
10.1016/S0304-3975(99)00071-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Electronic cash is arguably one of the most important applications of modem cryptology. There have been two types of electronic cash schemes namely on-line and off-line. In general off-line schemes are more efficient than on-line ones. The two fundamental issues with any off-line electronic cash scheme have been the detection of double spending and provision of anonymity. These issues make the design of secure off-line electronic cash schemes not an easy task. Cut-and-choose technology was one of the first techniques that was introduced to address the issue of double spending in an off-line scheme. However, this technique is not very efficient. Subsequently, other techniques had been proposed to achieve both double spending and client anonymity without using the cut and choose method. These include the works of Brands based on the discrete logarithm and that of Ferguson based on RSA and polynomial secret sharing scheme. In this paper, we propose an improved version of off-line electronic cash scheme based on the Ferguson's protocol. This scheme improves the efficiency by making some of the parameters used in the protocol to be reusable and removes the risk of framing by the bank by hiding the client's identity. (C) 1999 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 12 条
[1]  
Brands S., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P302
[2]  
CAMENISCH J, 1996, LECT NOTES COMPUTER, V1146, P31
[3]  
CHAUM D, 1990, LECT NOTES COMPUT SC, V403, P319
[4]  
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[5]  
Ferguson N., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P318
[6]  
FERGUSON NT, 1994, ADV CRYPTOLOGY
[7]  
Frankel Y., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P286, DOI 10.1007/BFb0034855
[8]  
OKAMOTO T, 1992, LECT NOTES COMPUT SC, V576, P324
[9]  
OKAMOTO T, 1991, ADV CRYPTOLOGY
[10]  
SCHNORR CP, 1990, LNCS, V435, P235