Skip to main content

Fair Tracing without Trustees

  • Conference paper
  • First Online:
Financial Cryptography (FC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2339))

Included in the following conference series:

Abstract

We present an electronic payment system offering a new kind of tracing mechanism. This mechanism is optimistic fair, as any misuse of the tracing mechanism is prevented by using an audit concept so that a violation of privacy can be detected and will be prosecuted. Thus, compared to previously proposed tracing methods our optimistic fair tracing approach offers more privacy for customers and does not need any trusted third parties, which simplifies the infrastructure of the payment system. Our payment system is able to defend against blackmailing, kidnapping, and bank robberies and can also be used to support investigations of money laundering and illegal purchases.

This work was supported by the Deutsche Forschungsgemeinschaft (DFG) as part of the PhD program (Graduiertenkolleg) “Enabling Technologies for Electronic Commerce” at Darmstadt University of Technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AAB+98._H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. Neumann, R. Rivest, J. Schiller, and B. Schneier. The risks of key recovery, key escrow, and trusted third-party encryption. Online available at http://www.cdt.org/crypto/risks98, 1998. An earlier version appeared in World Wide Web Journal, v. 2, n. 3, 1997, pages 241–257.

    Google Scholar 

  2. N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In 4th ACM Conference on Computer and Communications Security — CCS’97, pages 6–17, Zürich, Switzerland, 1997. ACM Press.

    Google Scholar 

  3. D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology — CRYPTO’88, volume 401 of Lecture Notes in Computer Science, pages 319–327. Springer-Verlag, 1988.

    Google Scholar 

  4. D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology — CRYPTO’82, pages 199–203. Plenum, 1983.

    Google Scholar 

  5. D. Chaum. Zero-knowledge undeniable signatures. In Advances in Cryptology — EUROCRYPT’90,volume 473 of Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, 1990.

    Google Scholar 

  6. J. Camenisch, U. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In Computer Security — ESORICS’96, volume 1146 of Lecture Notes in Computer Science, pages 31–43. Springer-Verlag, 1996.

    Google Scholar 

  7. D. Chaum and H. vanAntwerpen. Undeniable signatures. In Advances in Cryptology — CRYPTO’89, volume 435 of Lecture Notes in Computer Science, pages 212–216. Springer-Verlag, 1989.

    Google Scholar 

  8. G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung. Anonymity control in e-cash systems. In Financial Cryptography-FC’97, volume 1318 of Lecture Notes in Computer Science, pages 1–16. Springer-Verlag, 1997.

    Google Scholar 

  9. Y. Frankel, Y. Tsiounis, and M. Yung. “Indirect discourse proofs”: Achieving efficient fair off-line e-cash. In Advances in Cryptology-ASIACRYPT’96, volume 1163 of Lecture Notes in Computer Science, pages 286–300. Springer-Verlag, 1996.

    Chapter  Google Scholar 

  10. M. Jakobsson. Mini-cash: A minimalistic approach to e-commerce. In Public Key Cryptography-PKC’99, volume 1560 of Lecture Notes in Computer Science, pages 122–135. Springer-Verlag, March 1999.

    Chapter  Google Scholar 

  11. M. Jakobsson and D. M’Raïhi. Mix-based electronic payments. In Annual International Workshop on Selected Areas in Cryptography-SAC’98, volume 1556 of Lecture Notes in Computer Science, pages 157–173. Springer-Verlag, 1998.

    Chapter  Google Scholar 

  12. M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Advances in Cryptology-EUROCRYPT’96, volume 1070 of Lecture Notes in Computer Science, pages 143–154. Springer-Verlag, 1996.

    Google Scholar 

  13. M. Jakobsson and M. Yung. Revokable and versatile electronic money. In 3rd ACM Conference on Computer and Communications Security-CCS’96, pages 76–87. ACM Press, 1996.

    Google Scholar 

  14. D. Kügler and H. Vogt. Marking: A privacy protecting approach against blackmailing. In Public Key Cryptography-PKC 2001, volume 1992 of Lecture Notes in Computer Science, pages 137–152. Springer-Verlag, 2001.

    Google Scholar 

  15. T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. In Advances in Cryptology-CRYPTO’92, volume 740 of Lecture Notes in Computer Science, pages 31–53. Springer-Verlag, 1992.

    Google Scholar 

  16. H. Petersen and G. Poupard. Efficient scalable fair cash with off-line extortion prevention. In International Conference on Information and Communications Security-ICICS’97, volume 1334 of Lecture Notes in Computer Science, pages 463–477. Springer-Verlag, 1997.

    Google Scholar 

  17. B. Schoenmakers. Security aspects of the ecash payment system. In COSIC’97 Course, volume 1528 of Lecture Notes in Computer Science, pages 338–352. Springer-Verlag, 1997.

    Google Scholar 

  18. M. Stadler, J.-M. Piveteau, and J. Camenisch. Fair blind signatures. In Advances in Cryptology-EUROCRYPT’95, volume 921 of Lecture Notes in Computer Science, pages 209–219. Springer-Verlag, 1995.

    Google Scholar 

  19. B. von Solms and D. Naccache. On blind signatures and perfect crimes. Computers and Security, 11(6):581–583, 1992.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kügler, D., Vogt, H. (2002). Fair Tracing without Trustees. In: Syverson, P. (eds) Financial Cryptography. FC 2001. Lecture Notes in Computer Science, vol 2339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46088-8_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-46088-8_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44079-6

  • Online ISBN: 978-3-540-46088-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics