Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Distributed architectures for electronic cash schemes: a survey

Published: 01 June 2009 Publication History

Abstract

The volume of E-commerce transactions has considerably increased in the last several years. One of the most important aspects of such progress is the efforts made to develop and deploy dependable and secure payment infrastructures. Among these infrastructures is electronic cash, which is an attempt to reproduce the characteristics of paper cash in online transactions. Electronic cash schemes have so far been the purpose of a significant amount of research work. Although real-life deployments of such schemes are expected to take place in highly distributed environments, limited attention has been paid in the literature on underlying architectural issues. So far the focus has mostly been on addressing only security issues. However, for real-life deployment, distributed processing criteria such as performance, scalability and availability are of prime importance. In this paper, through a survey of the literature, we identify and analyse the different distributed architectural styles underlying existing e-cash schemes. We discuss the strengths and limitations of these architectures with respect to fundamental system distribution criteria. In light of such discussion, we make some recommendations for designing effective distributed e-cash systems from an architectural perspective.

References

[1]
Acquisti, A., Christin, N., Parno, B. and Perrig, A. (2008) Countermeasures against government-scale monetary forgery. Proc. 12th International Conference on Financial Cryptography and Data Security (FC08) (Cozumel, Mexico, 2008), Springer
[2]
Anderson, R. J., Manifavas, C. and Sutherland, C. (1996) Netcard - a practical electronic-cash system. Proc. International Workshop on Security Protocols (Cambridge, United Kingdom), Vol. 1189 of Lecture Notes in Computer Science, pp. 49-57. Springer
[3]
Asokan, N., Janson, P. A., Steiner, M. and Waidner, M. (1997) The state of the art in electronic payment systems. IEEE Comput., 30:9, pp. 28-35.
[4]
Bellare, M., Garay, J. A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Harreweghen, E. and Waidner, M. (2000) Design, implementation, and deployment of the ikp secure electronic payment system. IEEE J. Sel. Areas Commun., 18:4, pp. 611-627.
[5]
Brands, S. (1993) Untraceable off-line cash in wallets with observers (extended abstract). Proc. 13th Annual International Cryptology Conference (CRYPTO'93) (Santa Barbara, California, USA), Vol. 773 of Lecture Notes in Computer Science, pp. 302-318. Springer
[6]
Brands, S. (1995) Off-line electronic cash based on secret-key certificates. Proc. 2nd Latin American Symposium on Theroretical Informatics (LATIN'95) (Valparaiso, Chile), Vol. 911 of Lecture Notes in Computer Science, pp. 131-166. Springer
[7]
Buttyan, L. and Salem, N. B. (2001) A payment scheme for broadcast multimedia streams. Proc. 6th IEEE Symposium on Computers and Communications (ISCC 2001) (Hammamet, Tunisia), pp. 669-673. IEEE Computer Society
[8]
Camenisch, J. and Stadler, M. (1997) Efficient group signatures for large groups. Proc.17th Annual International Cryptology Conference (CRYPTO'97) (Santa Barbara, California, USA), Vol. 1294 of Lecture Notes in Computer Science, pp. 410-424. Springer
[9]
Cash, O. A. E. and Crime (1999) Tomas sander and amnon ta-shma. Proc. 2nd International Workshop on Information Security (ISW'99) (Kuala Lumpur, Malaysia), Vol. 1729 of Lecture Notes in Computer Science, pp. 202-206. Springer
[10]
Chaum, D. (1982) Blind signatures for untraceable payments. Proc. Advances in Cryptology (CRYPTO'82), pp. 199-203.
[11]
Chaum, D. (1989) Online cash checks. Proc. Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'89), Vol. 434 of Lecture Notes in Computer Science, pp. 288-293. Springer, Houthalen, Belgium
[12]
Chaum, D., Fiat, A. and Naor, M. (1988) Untraceable electronic cash. Proc. 8th Annual International Cryptology Conference (CRYPTO'88), Vol. 403 of Lecture Notes in Computer Science, pp. 319-327. Springer, Santa Barbara, CA
[13]
Chaum, D. and Pedersen, T. P. (1992) Transferred cash grows in size. Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'92), Vol. 547 of Lecture Notes in Computer Science, pp. 390-407. Springer, Balatonfured, Hungary
[14]
Chaum, D. and van Heyst, E. (1991) Group signatures. Proc. Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'91), Vol. 547 of Lecture Notes in Computer Science, pp. 257-265. Springer, Brighton
[15]
Even, S. and Goldreich, O. (1984) Electronic wallet. Proc. Advances in Cryptology (CRYPTO'83), pp. 383-386. Plenum Press, New York
[16]
Ferguson, N. (1993) Extensions of single-term coins. Proc. 13th Annual International Cryptology Conference (CRYPTO'93), Vol. 773 of Lecture Notes in Computer Science, pp. 292-301. Springer, Santa Barbara, CA
[17]
Ferguson, N. (1993) Single term off-line coins. Proc. Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'93), Vol. 765 of Lecture Notes in Computer Science, pp. 318-328. Springer, Lofthus, Norway
[18]
Ferrer-Gomila, J. L., Payeras-Capella, M. and I Rotger, L.H. (2003) A fully anonymous electronic payment scheme for b2b. Proc. International Conference Web Engineering (ICWE 2003), Vol. 2722 of Lecture Notes in Computer Science, pp. 76-79. Springer, Oviedo, Spain
[19]
Frankel, Y., Tsiounis, Y. and Yung, M. (1998) Fair off-line e-cash made easy. Proc. International Conference on the Theory and Applications of Cryptology and Information Security - Advances in Cryptology (ASIACRYPT '98), Vol. 1514 of Lecture Notes in Computer Science, pp. 257-270. Springer, Beijing
[20]
Guan, S. U. and Hua, F. (2003) A multi-agent architecture for electronic payment. Int. J. Inform. Technol. Decision Making, 2:3, pp. 497-522.
[21]
Guan, S. U., Tan, S. L. and Hua, F. (2004) A modularized electronic payment system for agent-based e-commerce. J. Res. Pract. Inform. Technol., 36:2, pp. 67-87.
[22]
Hoepman, J. -H. and Jacobs, B. (2008) Increased security through open source. CoRR: Computing Research Repository
[23]
Jakobsson, M. and Juels, A. (1998) X-cash: Executable digital cash. Proc. 2nd International Conference on Financial Cryptography (FC'98), Vol. 1465 of Lecture Notes in Computer Science, pp. 16-27. Springer, Anguilla
[24]
Jamali, N. and Zhao, X. (2005) A scalable approach to multi-agent resource acquisition and control. Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2005), pp. 868-875. ACM Press, Utrecht, Netherlands
[25]
Jarecki, S. and Odlyzko, A. M. (1997) An efficient micropayment system based on probabilistic polling. Proc. 1st International Conference on Financial Cryptography (FC'97), Vol. 1318 of Lecture Notes in Computer Science, pp. 173-192. Springer, Anguilla
[26]
Lamport, L. (1981) Password authentication with insecure communication. Commun. ACM, 11:24, pp. 770-772.
[27]
Lipton, R. J. and Ostrovsky, R. (1998) Micropayments via efficient coin-flipping. Proc. 2nd International Conference on Financial Cryptography (FC'98), Vol. 1465 of Lecture Notes in Computer Science, pp. 1-15. Springer, Anguilla
[28]
Liu, J. K., Tsang, P. P. and Wong, D. S. (2005) Recoverable and untraceable e-cash. Proc. 2nd European Public Key Infrastructure Workshop: Research and Applications (EuroPKI 2005), Vol. 3545 of Lecture Notes in Computer Science, pp. 206-214. Springer, Canterbury
[29]
Low, S. H., Maxemchuk, N. F. and Paul, S. (1996) Anonymous credit cards and their collusion analysis. IEEE/ACM Trans. Network., 4:6, pp. 809-816.
[30]
Lysyanskaya, A. and Ramzan, Z. (1998) Group blind digital signatures: A scalable solution to electronic cash. Proc. 2nd International Conference on Financial Cryptography (FC'98), Vol. 1465 of Lecture Notes in Computer Science, pp. 184-197. Springer, Anguilla
[31]
Medvinsky, G. and Neuman, B. C. (1993) Netcash: A design for practical electronic currency on the internet. Proc. 1st ACM Conference on Computer and Communications Security (CCS'93), pp. 102-106. ACM, Fairfax, VA
[32]
Meng, B. and Qianxing (2004) Socpt: A secure online card payment protocol. Proc. 8th International Conference on Computer Supported Cooperative Work in Design, pp. 679-684.
[33]
Merkle, R. C. (1989) A certified digital signature. Proc. 9th Annual International Cryptology Conference (CRYPTO'89), Vol. 435 of Lecture Notes in Computer Science, pp. 218-238. Springer, Santa Barbara, CA
[34]
Neuman, B. C. and Medvinsky, G. (1995) Requirements for network payment: The netcheque perspective. Proc. Technologies for the Information Superhighway (COMPCON'95), pp. 32-36. IEEE-CS, San Francisco, CA
[35]
Nguyen, K. Q., Mu, Y. and Varadharajan, V. (1997) Secure and efficient digital coins. Proc. 13th Annual Computer Security Applications Conference (ACSAC 1997), pp. 9-15. IEEE Computer Society, San Diego, CA
[36]
Okamoto, T. and Ohta, K. (1990) Disposable zero-knowledge authentication and their applications to untraceable electronic cash. Proc. 9th Annual International Crytology Conference (CRYPTO'89), Vol. 435 of Lecture Notes in Computer Science, pp. 481-496. Springer, Santa Barbara, CA
[37]
Okamoto, T. and Ohta, K. (1992) Universal electronic cash. Proc. 11th Annual International Cryptology Conference (CRYPTO'91), Vol. 576 of Lecture Notes in Computer Science, pp. 324-337. Springer, Santa Barbara, CA
[38]
Osipkov, I., Vasserman, E. Y., Hopper, N. and Kim, Y. (2007) Combating double-spending using cooperative p2p systems. Proc. 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), p. 41. IEEE Computer Society, Toronto
[39]
Pagnia, H. and Jansen, R. (1997) Towards multiple-payment schemes for digital money. Proc. 1st International Conference on Financial Cryptography (FC'97), Vol. 1318 of Lecture Notes in Computer Science, pp. 203-216. Springer, Anguilla
[40]
Rivest, R. L. and Shamir, A. (1996) Payword and micromint: Two simple micropayment schemes. Proc. Security Protocols Workshop, Vol. 1189 of Lecture Notes in Computer Science, pp. 69-87. Springer, Cambridge
[41]
Rothnie, J. B. and Goodman, N. (1977) A survey of research and development in distributed database management. Proc. 3rd international conference on Very large data bases (VLDB'1977), pp. 48-62. VLDB Endowment, Tokyo
[42]
Sander, T. and Ta-Shma, A. (1999) Auditable, anonymous electronic cash (extended abstract). Proc. 19th Annual International Cryptology Conference (CRYPTO'99), Vol. 1666 of Lecture Notes in Computer Science, pp. 555-572. Springer, Santa Barbara, CA
[43]
Sirbu, M. and Tygar, D. (1995) Netbill: An internet commerce system optimized for network delivered services. Proc. Technologies for the Information Superhighway (COMPCON'95), pp. 34-39. IEEE-CS, San Francisco, CA
[44]
Sirbu, M. A. (1997) Credits and debits on the internet. IEEE Spectrum, 34:2, pp. 23-29.
[45]
Tracz, R. and Wrona, K. (2001) Fair electronic cash withdrawal and change return for wireless networks. Proc. 1st International Workshop on Mobile Commerce, pp. 14-19. ACM, Rome
[46]
Varadharajan, V., Nguyen, K. Q. and Mu, Y. (1999) On the design of efficient rsa-based off-line electronic coin schemes. Theor. Comp. Sci., 226:1, pp. 173-184.
[47]
Wang, H. and Zhang, Y. (2001) Untraceable off-line electronic coin flow in e-commerce. 24th Australian Computer Science Conference (ACSC'01), pp. 191-198. IEEE Computer Society, GoldCoast
[48]
Watson, A. (1998) Electronic cash and set. Proc. Internet Crime, Australian Institute of Criminology, Melbourne
[49]
Wei, K., Smith, A. J., Chen, Y. -F. R. and Vo, B. (2006) Whopay: A scalable and anonymous payment system for peer-to-peer environments. Proc. 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), p. 13. IEEE Computer Society, Lisboa
[50]
Wuu, L. -C., Lin, C. -M. and Wang, W. -F. (2006) Anonymous and transferable coins in pay-fair e-commerce. IEICE - Trans. Inform. Syst., pp. 2950-2956.
[51]
Xu, Q. and Zhao, H. (2000) Distributed electronic payment system based on bank union. Proc. 4th International Conference on High-Performance Computing in the Asia-Pacific Region, 1, pp. 548-551. IEEE Computer Society, Beijing
[52]
Yacobi, Y. (1997) On the continuum between on-line and off-line e-cash systems. Proc. 1st International Conference on Financial Cryptography (FC'97), Vol. 1318 of Lecture Notes in Computer Science, pp. 193-202. Springer, Anguilla
[53]
Yacobi, Y. (2001) Risk management for e-cash systems with partial real-time audit. Netnomics, 3, pp. 119-127.
[54]
Yang, B. and Garcia-Molina, H. (2003) Ppay: micropayments for peer-to-peer systems. Proc. 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 300-310. ACM Press, Washingtion, DC
[55]
Yang, Z., Lang, W. and Tan, Y. (2004) A new fair micropayment system based on hash chain. Proc. IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), pp. 139-145. IEEE Computer Society, Taipei
[56]
Yen, S. -M. (2001) Payfair: A prepaid internet micropayment scheme ensuring customer fairness. IEE Proc.: Comp. Dig. Techn., 148:6, pp. 207-213.
[57]
Zhu, F., Guan, S. -U. and Yang, Y. (2000) Internet Commerce and Software Agents: Cases, technologies and Opportunities. Chapter SAFER E-Commerce: Secure Agent Fabrication, Evolution & Roaming for E-Commerce, pp. 190-206. IDEA Group Publishing

Cited By

View all
  • (2010)Double spending protection for e-cash based on risk managementProceedings of the 13th international conference on Information security10.5555/1949317.1949361(394-408)Online publication date: 25-Oct-2010
  1. Distributed architectures for electronic cash schemes: a survey

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image International Journal of Parallel, Emergent and Distributed Systems
    International Journal of Parallel, Emergent and Distributed Systems  Volume 24, Issue 3
    June 2009
    82 pages
    ISSN:1744-5760
    EISSN:1744-5779
    Issue’s Table of Contents

    Publisher

    Taylor & Francis, Inc.

    United States

    Publication History

    Published: 01 June 2009

    Author Tags

    1. dependability
    2. distributed architecture
    3. electronic cash
    4. electronic commerce
    5. security
    6. software architecture

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2010)Double spending protection for e-cash based on risk managementProceedings of the 13th international conference on Information security10.5555/1949317.1949361(394-408)Online publication date: 25-Oct-2010

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media