User efficient recoverable off-line e-cash scheme with fast anonymity revoking

被引:13
作者
Fan, Chun-I [1 ]
Huang, Vincent Shi-Ming [2 ]
Yu, Yao-Chun [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[2] Ind Technol Res Inst, Cloud Comp Ctr Mobile Applicat, Hsinchu 31040, Taiwan
关键词
Electronic cash; Double spending; Unlinkability; Anonymity; Chameleon hash functions;
D O I
10.1016/j.mcm.2012.07.012
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to rapid progress in the internet and cloud computing technologies, electronic commerce is becoming more and more popular. Many people and businesses deal with their payment transactions via the Internet. The technologies of credit cards, electronic tickets, electronic cash (e-cash), and other advanced payment services have realized the vision of electronic commerce. In this paper, we proposed an off-line e-cash scheme with anonymity, unlinkability, double-spending checking, anonymity control, and fast anonymity revocation on double-spending. In an off-line e-cash scheme, the bank which could be a financial cloud server or the third party (TTP) must be able to revoke the anonymity of a user who doubly spent her/his e-cash(s). In our proposed scheme, the bank can quickly derive the identity of the user who doubly spent her/his e-cash(s) without the participation of TTP. Besides, if some illegal transactions are reported, TTP can also directly revoke the anonymity of the user who spent her/his e-cash(s) in the illegal transactions. Furthermore, we also provide traceability for the police to trace a specific user, and maybe a crime, in some situations. Finally, the security of the proposed features, unlinkability and unforgeability, are formally proved in this paper. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 16 条
  • [1] [Anonymous], 1994, Advances in Cryptology-CRYPTO' 93, DOI DOI 10.1007/3-540-48329-2_26
  • [2] The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    [J]. JOURNAL OF CRYPTOLOGY, 2003, 16 (03) : 185 - 215
  • [3] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [4] Fan C.-I., 2007, LECT NOTES COMPUTER, V4752
  • [5] Fan C.-I., 2007, J ORG COMPUTING ELEC, V17
  • [6] Fan C.-I., 2008, INT J ELECT COMMERCE, V13
  • [7] Hou XS, 2004, 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, P595
  • [8] Juang W.-S., 2004, APPL MATH COMPUTATIO, V147
  • [9] Krawczyk H., 2000, PROC NDSS, P143
  • [10] Liu JK, 2005, LECT NOTES COMPUT SC, V3545, P206, DOI 10.1007/11533733_14