Anonymous fair transaction protocols based on electronic cash

被引:5
作者
Fan, Chun-I [1 ]
Liang, Yu-Kuang [2 ]
机构
[1] Chunghwa Telecom Co Ltd, Telecommun Labs, Tao Yuan, Taiwan
[2] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
关键词
anonymity; blind signatures; cryptography; electronic cash; electronic commerce; fair transactions; security and privacy;
D O I
10.2753/JEC1086-4415130105
中图分类号
F [经济];
学科分类号
02 ;
摘要
It is important for electronic transactions to be fair because customers and merchants cannot interact face-to-face. Several proposed fair transaction protocols deal adequately with the fairness issue but not with the equally critical matters of customer anonymity and privacy. This paper proposes a novel fair transaction protocol based on electronic cash that achieves both anonymity and fairness. Utilizing an off-line trusted third party (TTP), the protocol is efficient and practical. The customer's anonymity and privacy are protected because payment information is not revealed to anyone, including the TTP. The proposed method is independent of the underlying electronic cash scheme and thus can be realized with any e-cash system based on blind signatures. It also offers anonymity revocation to prevent crime and solves the unlimited-growth problem of the bank's e-cash database.
引用
收藏
页码:131 / 151
页数:21
相关论文
共 26 条
  • [1] ABE M, 1996, LNCS, V1163, P244, DOI DOI 10.1007/BFB0034851
  • [2] Efficient and practical fair exchange protocols with off-line TTP
    Bao, F
    Deng, RH
    Mao, WB
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 77 - 85
  • [3] Bellare M., 1995, P 1 ACM C COMPUTER C, P62
  • [4] A FAIR PROTOCOL FOR SIGNING CONTRACTS
    BENOR, M
    GOLDREICH, O
    MICALI, S
    RIVEST, RL
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (01) : 40 - 46
  • [5] Boyd C, 1998, LECT NOTES COMPUT SC, V1514, P271
  • [6] CAPELLA M, 2005, LECT NOTES COMPUTER, V3592, P60
  • [7] CHAUM D, 1990, LECT NOTES COMPUT SC, V403, P319
  • [8] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [9] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88
  • [10] Chen LQ, 1998, LECT NOTES COMPUT SC, V1514, P286