Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/646758.705703guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)

Published: 22 August 1993 Publication History

Abstract

We show how the electronic cash scheme in [Fer93a] can be extended to provide n -spendable coins. Furthermore, we show how observers can be incorporated in the protocols to provide prior restraint against double spending by the user, instead of just detection after the fact.

References

[1]
Bellare, Micali, "How To Sign Given Any Trapdoor Function," Proceedings of Crypto '88, Springer-Verlag, pages 200-215.
[2]
Brands, S., "An Efficient Off-line Electronic Cash System Based On The Representation Problem," CWI Technical Report CS-R9323, April 11, 1993.
[3]
Brands, S., "Untraceable Off-Line Cash Based On The Representation Problem," manuscript. To be published as a CWI Technical Report in Januari/Februari 1994.
[4]
Brickell, E. and McCurley, K., "An Interactive Identification Scheme Based On Discrete Logarithms And Factoring," Journal of Cryptology, Vol. 5 no. 1 (1992), pages 29-39.
[5]
Chaum, D., "Achieving Electronic Privacy," Scientific American, August 1992, pages 96-101.
[6]
Chaum, D., "Security Without Identification: Transaction Systems To Make Big Brother Obsolete," Communications of the ACM, Vol. 28 no. 10, October 1985, pages 1020-1044.
[7]
Chaum, D., "Card-computer moderated systems," (unpublished), 1989.
[8]
Chaum, D., Fiat, A. and Naor, M., "Untraceable Electronic Cash," Proceedings of Crypto '88, Springer-Verlag, pages 319-327.
[9]
Chaum, D. and Pedersen, T., "Wallet Databases With Observers," Preproceedings of Crypto '92.
[10]
Cramer, R. and Pedersen, T., "Improved Privacy In Wallets With Observers', Preproceedings of EuroCrypt '93.
[11]
Ferguson, N., "Single Term Off-Line Coins", Preproceedings of EuroCrypt '93.
[12]
Ferguson, N., "Extensions Of Single-Term Off-Line coins," these proceedings.
[13]
Fiat, A. and Shamir, A., "How To Prove Yourself: Practical Solutions To Identification And Signature Problems," Proceedings of Crypto '86, Springer-Verlag, pages 186-194.
[14]
Okamoto, T., "Provably Secure And Practical Identification Schemes And Corresponding Signature Schemes," Preproceedings of Crypto '92.
[15]
Schnorr, CP., "Efficient Signature Generation By Smart Cards," Journal of Cryptology, Vol. 4 no. 3 (1991), pages 161-174.
[16]
"No Hiding Place / Big Brother Is Clocking You," The Economist, August 7th- 13th 1993.

Cited By

View all
  • (2019)(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless TokensJournal of Cryptology10.1007/s00145-018-9288-x32:2(459-497)Online publication date: 1-Apr-2019
  • (2017)Enabling Anonymous Authorization and Rewarding in the Smart GridIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2015.249621114:5(565-572)Online publication date: 1-Sep-2017
  • (2016)Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable ProofsProceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society10.1145/2994620.2994625(123-133)Online publication date: 24-Oct-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '93: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
August 1993
491 pages
ISBN:3540577661

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 22 August 1993

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2019)(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless TokensJournal of Cryptology10.1007/s00145-018-9288-x32:2(459-497)Online publication date: 1-Apr-2019
  • (2017)Enabling Anonymous Authorization and Rewarding in the Smart GridIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2015.249621114:5(565-572)Online publication date: 1-Sep-2017
  • (2016)Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable ProofsProceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society10.1145/2994620.2994625(123-133)Online publication date: 24-Oct-2016
  • (2015)Eclipse attacks on Bitcoin's peer-to-peer networkProceedings of the 24th USENIX Conference on Security Symposium10.5555/2831143.2831152(129-144)Online publication date: 12-Aug-2015
  • (2015)Cryptographic Theory Meets PracticeACM Transactions on Information and System Security10.1145/269990417:3(1-31)Online publication date: 27-Mar-2015
  • (2015)A reputation system supporting unlinkable, yet authorized expert ratingsProceedings of the 30th Annual ACM Symposium on Applied Computing10.1145/2695664.2695892(2320-2327)Online publication date: 13-Apr-2015
  • (2014)Rerandomizable Threshold Blind SignaturesRevised Selected Papers of the 6th International Conference on Trusted Systems - Volume 947310.1007/978-3-319-27998-5_5(70-89)Online publication date: 16-Dec-2014
  • (2010)Providing witness anonymity under peer-to-peer settingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2010.20418215:2(324-336)Online publication date: 1-Jun-2010
  • (2009)PSPProceedings of the 8th ACM workshop on Privacy in the electronic society10.1145/1655188.1655196(51-60)Online publication date: 9-Nov-2009
  • (2009)XPayProceedings of the 8th ACM workshop on Privacy in the electronic society10.1145/1655188.1655195(41-50)Online publication date: 9-Nov-2009
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media