Anonymity in Complex Transactions for e-Business

  • Cătălin V. BîrjoveanuEmail author
  • Mirela Bîrjoveanu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1118)


Anonymity of the customer and each merchant is a key property that must be considered in a fair exchange e-commerce protocol. The customer may not want to reveal sensitive data of his identity (as credit card number, information about customer’s bank, customer’s account number) so that this information can not be used by merchant in commercial purpose to build spending habits of the customer. Also, a merchant may want to remain anonymous. For example, a merchant who has business in many areas may want that his customers can not link transactions where the merchant is involved in all these areas. In our previous work [4], a fair exchange e-commerce protocol for complex transactions in that a customer wants to buy several different physical products from different merchants is proposed. This solution provides customer anonymity, non-repudiation, integrity and confidentiality of data exchanged between the parties. In this paper, we extend the solution from [4] obtaining both anonymity of customer and each merchant, while preserving all properties obtained in [4].


B2C/B2B Anonymity Complex transactions Fair exchange Electronic commerce security 


  1. 1.
    Alaraj, A.: Fairness in physical products delivery protocol. Int. J. Comput. Netw. Commun. (IJCNC) 4(6), 99 (2012)Google Scholar
  2. 2.
    Androulaki, E., Bellovin, S.: APOD: anonymous physical object delivery. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 202–215. Springer, Heidelberg (2009). Scholar
  3. 3.
    Bîrjoveanu, C.V.: Anonymity and fair-exchange in e-commerce protocol for physical products delivery. In: 12th International Conference on Security and Cryptography, pp. 170–177. SCITEPRESS (2015).
  4. 4.
    Bîrjoveanu, C.V., Bîrjoveanu, M.: Preserving anonymity in fair exchange complex transactions e-commerce protocol for B2C/B2B applications. In: 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018, vol. 1, pp. 99–110. SCITEPRESS (2018).
  5. 5.
    Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997). Scholar
  6. 6.
    Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, New York (1990). Scholar
  7. 7.
    Djuric, Z., Gasevic, D.: FEIPS: a secure fair-exchange payment system for internet transactions. Comput. J. 58(10), 2537–2556 (2015)CrossRefGoogle Scholar
  8. 8.
    Draper-Gil, G., Ferrer-Gomila, J.L., Hinarejos, M.F., Zhou, J.: An asynchronous optimistic protocol for atomic multi-two-party contract signing. Comput. J. 56(10), 1258–1267 (2013)CrossRefGoogle Scholar
  9. 9.
    Li, H., Kou, W., Du, X.: Fair e-commerce protocols without a third party. In: 11th IEEE Symposium on Computers and Communications. IEEE (2006).
  10. 10.
    Liu, Y.: An optimistic fair protocol for aggregate exchange. In: 2nd International Conference on Future Information Technology and Management Engineering. IEEE (2009).
  11. 11.
    Lysyanskaya, A., Ramzan, Z.: Group blind digital signatures: a scalable solution to electronic cash. In: Hirchfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 184–197. Springer, Heidelberg (1998). Scholar
  12. 12.
    Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H., Adams, C. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000). Scholar
  13. 13.
    Onieva, J.A., Lopez, J., Zhou, J.: Secure Multi-Party Non-Repudiation Protocols and Applications. Springer, Heidelberg (2009). Scholar
  14. 14.
    Zhang, Q., Markantonakis, K., Mayes, K.: A practical fair exchange e-payment protocol for anonymous purchase and physical delivery. In: 4th ACS/IEEE International Conference on Computer Systems and Applications. IEEE (2006).

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science“Al. I. Cuza” University of IaşiIaşiRomania
  2. 2.Continental AutomotiveIaşiRomania

Personalised recommendations