Abstract
For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency, largely due to the use of restrictive blind signatures, on the other hand efficient schemes often suffer from serious security drawbacks. In this paper, we propose both a new tool providing scalable anonymity at a low cost, and a new Internet business: “Anonymity Providers”.
Those “Anonymity Providers” certify re-encrypted data after having been convinced of the validity of the content, but without knowing anything about this latter. It is a very useful third party in many applications (e.g. for revocable anonymous electronic cash, where a coin would be a certified encryption of the user’s identity, such that a Revocation Center, and only it, can recover this identity, if needed).
With this new tool, each user can get the required anonymity level, depending on the available time, computation and/or money amounts. Furthermore, the “Anonymity Provider” may be a new type of business over the Internet, profitable for everybody: - from the provider point of view as he can charge the service; - from the user point of view as he can obtain a high level of anonymity at low computational cost. Moreover, a user who does not require anonymity has no extra computation to perform.
This technique is quite efficient because of its “optimistic” orientation: in case of honest use, everything is very efficient. Some slightly more heavy processes have to be performed in case of fraud detection, but with overwhelming tracing success.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Abe. Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers. In Eurocrypt’ 98, LNCS 1403, pages 437–447. Springer-Verlag, Berlin, 1998.
M. Abe. Mix-Networks on Permutation Networks. In Asiacrypt’ 99, LNCS 1716. Springer-Verlag, Berlin, 1999.
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among Notions of Security for Public-Key Encryption Schemes. In Crypto’ 98, LNCS 1462, pages 26–45. Springer-Verlag, Berlin, 1998.
M. Bellare and P. Rogaway. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62–73. ACM Press, New York, 1993.
S. A. Brands. An Efficient Off-Line Electronic Cash System Based on the Representation Problem. Technical Report CS-R9323, CWI, Amsterdam, 1993.
S. A. Brands. Restrictive Blinding of Secret-Key Certificates. Technical Report CS-R9509, CWI, Amsterdam, 1995.
E. Brickell, P. Gemmell, and D. Kravitz. Trustee-based Tracing Extensions to Anonymous Cash and Making of Anonymous Change. In SODA’ 95, pages 457–466, 1995.
J. Camenisch, J.-M. Piveteau, and M. Stadler. Fair Blind Signatures. In Eurocrypt’ 95, LNCS 921, pages 209–219. Springer-Verlag, Berlin, 1995.
J. Camenisch, J.-M. Piveteau, and M. Stadler. An Efficient Fair Payment System. In Proc. of the 3rd CCS, pages 88–94. ACM Press, New York, 1996.
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84–88, February 1981.
D. Chaum. Blind Signatures for Untraceable Payments. In Crypto’ 82, pages 199–203. Plenum, New York, 1983.
D. Chaum. Zero-Knowledge Undeniable Signatures. In Eurocrypt’ 90, LNCS 473, pages 458–464. Springer-Verlag, Berlin, 1991.
D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Crypto’ 88, LNCS 403, pages 319–327. Springer-Verlag, Berlin, 1989.
D. Chaum and H. van Antwerpen. Undeniable Signatures. In Crypto’ 89, LNCS 435, pages 212–216. Springer-Verlag, Berlin, 1990.
D. Chaum, E. van Heijst, and B. Pfitzmann. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. In Crypto’ 91, LNCS 576, pages 470–484. Springer-Verlag, Berlin, 1992.
Y. Desmedt and Y. Frankel. Threshold Cryptosystems. In Crypto’ 87, LNCS 293, pages 307–315. Springer-Verlag, Berlin, 1988.
W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6):644–654, November 1976.
T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, IT-31(4):469–472, July 1985.
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions of Identification and Signature Problems. In Crypto’ 86, LNCS 263, pages 186–194. Springer-Verlag, Berlin, 1987.
E. Fujisaki and T. Okamoto. Practical Escrow Cash Systems. In Security Protocols, 1996.
S. Goldwasser and S. Micali. Probabilistic Encryption. lournal of Computer and System Sciences, 28:270–299, 1984.
S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure Against Adaptative Chosen-Message Attacks. SIAM lournal of Computing, 17(2):281–308, April 1988.
M. Jakobsson. Blackmailing using Undeniable Signatures. In Eurocrypt’ 94, LNCS 950, pages 425–427. Springer-Verlag, Berlin, 1995.
M. Jakobsson. A Practical Mix. In Eurocrypt’ 98, LNCS 1403, pages 448–461. Springer-Verlag, Berlin, 1998.
M. Jakobsson. Flash Mixing. In Proc. of the 18th PODC, pages 83–89. ACM Press, New York, 1999.
M. Jakobsson and D. M’Rami. Mix-based Electronic Payment. In Proc. of the Fifth Annual Workshop on Selected Areas in Cryptography, LNCS 1556, pages 157–173. Springer-Verlag, Berlin, 1998.
M. Jakobsson and J. Müller. Improved Magic Ink Signatures Using Hints. In Financial Cryptography’ 99, LNCS 1648, pages 253–268. Springer-Verlag, Berlin, 1999.
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. In Eurocrypt’ 96, LNCS 1070, pages 143–154. Springer-Verlag, Berlin, 1996.
M. Jakobsson and C. P. Schnorr. Efficient Oblivious Proofs of Correct Exponentiation. In B. Preneel, ed., Proc. of CMS’ 99. Kluwer Academic Publishers, Boston, 1999.
M. Jakobsson and M. Yung. Distributed “Magic Ink” Signatures. In Eurocrypt’ 97, LNCS 1233, pages 450–464. Springer-Verlag, Berlin, 1997.
A. Juels, M. Luby, and R. Ostrovsky. Security of Blind Digital Signatures. In Crypto’ 97, LNCS 1294, pages 150–164. Springer-Verlag, Berlin, 1997.
M. Michels and M. Stadler. Efficient Convertible Undeniable Signature Schemes. Fourth Annual Workshop on Selected Areas in Cryptography available from http://www.scs.carleton.ca/~sac97, 1997.
T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In Crypto’ 92, LNCS 740, pages 31–53. Springer-Verlag, Berlin, 1992.
D. Pointcheval and J. Stern. Security Proofs for Signature Schemes. In Eurocrypt’ 96, LNCS 1070, pages 387–398. Springer-Verlag, Berlin, 1996.
D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 2000. Available from http://www.di.ens.fr/~pointche.
M. O. Rabin. Digitalized Signatures. In R. Lipton and R. De Millo, eds., Foundations of S ecure Computation, pages 155–166. Academic Press, New York, 1978.
C. Radu, R. Govaerts, and J. Vanderwalle. A Restrictive Blind Signature Scheme with Applications to Electronic Cash. In Communications and Multimedia Security II, pages 196–207. Chapman & Hall, London, 1996.
C. Radu, R. Govaerts, and J. Vanderwalle. Efficient Electronic Cash with Restricted Privacy. In Financial Cryptography’ 97, LNCS. Springer-Verlag, Berlin, 1997.
M. K. Reiter and A. D. Rubin. Crowds, anonymous web transactions. ACM Transactions on Information and System Security, 1:66–92, 1998.
C. P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161–174, 1991.
S. von Solms and D. Naccache. On Blind Signatures and Perfect Crimes. Computers &: Security, 11:581–583, 1992.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pointcheval, D. (2001). Self-Scrambling Anonymizers. In: Frankel, Y. (eds) Financial Cryptography. FC 2000. Lecture Notes in Computer Science, vol 1962. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45472-1_18
Download citation
DOI: https://doi.org/10.1007/3-540-45472-1_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42700-1
Online ISBN: 978-3-540-45472-4
eBook Packages: Springer Book Archive