Advertisement

Secure PC-Franking for Everyone

  • Gerrit Bleumer
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1875)

Abstract

PC franking systems allow customers to download postage value into their PCs and to print postage value onto envelopes or mailing labels by using regular desktop printers connected to their PCs. In emerging standards, such as the IBIP program of the US postal services, the resulting imprints are called indicia, and they are printed as 2-D bar codes that are easy and reliable to scan while passing through the mail delivery system. In contrast to the IBIP program, which requires a tamper responsive postal security device for each customer, we propose a pure software solution for PC franking systems that is more secure for the postal services, gives more privacy to the customers and has the potential of being much cheaper than any IBIP compliant franking system. In contrast to existing PC-franking products that require no hardware postal security device, our solution works off-line. Customers are not required to be online while printing indicia. Our solution operates an existing offline e-cash scheme over certain elliptic curves rather than overfinite fields.

Keywords

Open franking systems offine electronic cash blindsignature elliptic curves 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [B93]
    Stefan Brands: An Efficient Off-line Electronic Cash System Based On The Representation Problem; Centrum voor Wiskunde en Informatica, Computer Science/Departement of Algorithmics and Architecture, Report CS-R9323, March 1993.Google Scholar
  2. [B94]
    Stefan Brands: Untraceable Off-line Cash in Wallet with Observers; Crypto’ 93, LNCS 773, Springer-Verlag, Berlin 1994, 302–318.Google Scholar
  3. [B96]
    Stefan Brands: Privacy-Protected Transfer of Electronic Information; United States Patent 5,521,980, issued 05/28/1996.Google Scholar
  4. [BBCM94]
    Jean-Paul Boly, et al: The ESPRIT Project CAFE High Security Digital Payment Systems; ESORICS 94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875, Springer-Verlag, Berlin 1994, 217–230.Google Scholar
  5. [BC97]
    Stefan Brands, David Chaum: Minting’ electronic cash; IEEE Spectrum 34/2 (1997) 30–34.Google Scholar
  6. [CHP91]
    David Chaum, Eugne van Heijst, Birgit Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer; Crypto’ 91, LNCS 576, Springer-Verlag, Berlin 1992, 470–484.Google Scholar
  7. [CP92]
    David Chaum, Torben Pryds Pedersen: Wallet Databases with Observers. Crypto’ 92, LNCS 740, Springer Verlag, Berlin 1993, 89–105.Google Scholar
  8. [CP94]
    Ronald J. F. Cramer, Torben P. Pedersen: Improved Privacy in Wallets with Observers (Extended Abstract); Eurocrypt’ 93, LNCS 765, Springer-Verlag, Berlin 1994, 329–343.Google Scholar
  9. [DM96]
    ANSI/AIM BC11: International Symbology Specification-Data Matrix; 11/96, http://www.rvsi.com/cimatrix/DataMatrix.html
  10. [FS87]
    Amos Fiat, Adi Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature Problems; Crypto’ 86, LNCS 263, Springer-Verlag, Berlin 1987, 186–194.Google Scholar
  11. [IBIP99c]
    The United States Postal Services: Information-Based Indicia Program (IBIP)—Performance Criteria For Information-Based Indicia and Security Architecture For Closed IBI Postage Metering Systems (PCIBI-C); Draft January 12, 1999, http://ibip.tteam.com/html/programdoc.html
  12. [IBIP99o]
    The United States Postal Services: Information-Based Indicia Program (IBIP)—Performance Criteria For Information-Based Indicia and Security Architecture For Open IBI Postage Evidencing Systems (PCIBI-O); Draft June 25, 1999, http://ibip.tteam.com/html/programdoc.html
  13. [IEEE]
    IEEE P1363: Standard Specifications for Public-Key Cryptography; http://grouper.ieee.org/groups/1363/
  14. [K87]
    Neal Koblitz: A Course in Number Theory and Cryptography; Graduate Texts in Mathematics GTM 114, Springer-Verlag, Berlin 1987.Google Scholar
  15. [SN92]
    Sebastiaan von Solms, David Naccache: On Blind Signatures and Perfect Crimes; Computers & Security 11/6 (1992) 581–583.CrossRefGoogle Scholar
  16. [MOV97]
    Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography; CRC Press, Boca Raton 1997.zbMATHGoogle Scholar
  17. [O99]
    Andrew Odlyzko: Discrete Logarithms: The Past and the Future; Designs, Codes, and Cryptography (1999). http://www.research.att.com/amo/doc/discrete.logs.future.ps
  18. [P91]
    Jos’e Pastor: CRYPTOPOST,A Cryptographic Application to Mail Processing; Journal of Cryptology 3/2 (1991) 137–146.Google Scholar
  19. [S91]
    Claus P. Schnorr: Efficient Signature Generation by Smart Cards; Journal of Cryptology 4/3 (1991) 161–174.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Gerrit Bleumer
    • 1
  1. 1.Francotyp-PostaliaBirkenwerderGermany

Personalised recommendations