Self-Escrowed Cash against User Blackmailing
Protecting customer privacy is an important requirement when designing electronic cash systems. However, there is also concern that anonymous cash systems can be misused for criminal activities. Particularly blackmailing is in fact more severe in digital cash systems than in paper-based systems. This is because on the one hand the blackmailer is able to avoid physical contact and on the other hand there are no recognizable note numbers. To prevent such activities, several cash systems have been proposed where one or a collection of trustees can revoke the anonymity of a user. However, this also introduces a serious risk that this revocation ability is misused.
In this paper we show that the problem of user blackmailing can be solved without this risk. In our proposal, instead of a trustee, it is rather the blackmailed person who reveals the required information to trace extorted coins without compromising any of her secrets. We show how to derive such systems from concrete existing proposals for anonymityrevocable cash systems with passive trustee.
Key wordsEscrowed Cash Fair Cash Digital Coin Anonymity Revocation Blackmailing Self-Escrow
Unable to display preview. Download preview PDF.
- [BC93]Stefan Brands, David Chaum: Distance-Bounding Protocols; Eurocrypt’ 93, LNCS 765,Springer-Verlag, Berlin 1994, 344–359.Google Scholar
- [BGK95]Ernest Brickell, Peter Gemmell, David Kravitz: Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change; 6th ACM-SIAM Symposium on Discrete Algorithms (SODA) 1995, ACM ress, New York 1995, 457–466.Google Scholar
- [Bra94]Stefan Brands: Untraceable O.-line Cash in Wallet with Observers; Crypto’93, LNCS 773, Springer-Verlag, Berlin 1994, 302–318.Google Scholar
- [Cha83]David Chaum: Blind Signatures for untraceable payments; Crypto’ 82, Plenum Press, New York 1983, 199–203.Google Scholar
- [Cha89]David Chaum: Privacy Protected Payments-Unconditional Payer and/or Payee Untraceability; SMART CARD 2000: The Future of IC Cards, IFIP WG 11.6 Conference 1987, North-Holland, Amsterdam 1989, 69–93.Google Scholar
- [CP93]David Chaum, Torben Pryds Pedersen: Wallet Databases with Observers; Crypto’92, LNCS 740, Springer-Verlag, Berlin 1993, 89–105.Google Scholar
- [CPS96]Jan Camenisch, Jean-Marc Piveteau, Markus Stadler: An Efficient Fair Payment System; 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 1996, ACM Press, New York 1996, 88–94.Google Scholar
- [Fro96]A. Michael Froomkin: Flood Control on the Information Ocean, Living With Anonymity, Digital Cash, and Distributed Databases; Pittsburgh Journal of Law and Commerce 395, 1996. Available online at http://www.law.miami.edu/~froomkin/articles.
- [FTY96]Yair Frankel, Yiannis Tsiounis, Moti Yung: “Indirect Discourse Proofs”: Achieving Efficient Fair O.-Line E-cash; Asiacrypt’96, LNCS 1163, Springer-Verlag, Berlin 1997, 287–300.Google Scholar
- [FTY98]Yair Frankel, Yiannis Tsiounis, Moti Yung: Fair O.-Line e-Cash Made Easy; Asiacrypt’ 98, LNCS 1514, Springer-Verlag, Berlin 1998, 257–270.Google Scholar
- [JY96]Markus Jakobsson, Moti Yung: Revocable and Versatile Electronic Money; 3rd ACM Conference on Computer and Communications Security, ACM Press, New York 1996, 76–87.Google Scholar