Abstract
We introduce a new payment architecture that limits the power of an attacker while providing the honest user with privacy. Our proposed method defends against all known attacks on the bank, implements revocable privacy, and results in an efficient scheme which is well-suited for smartcard-based payment schemes over the Internet.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Abe, “Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix-centers,” Eurocrypt’ 98.
E. Brickell, P. Gemmell, D. Kravitz, “Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change,” Proc. 6th Annual ACMSIAM Symposium on Discrete Algorithms (SODA), 1995, pp. 457–466.
H. Bürk, A. Pfitzmann, “Digital Payment Systems Enabling Security and Unobservability,” Computers and Security 8/5 1989, pp. 399–416
J. Camenisch, U. Maurer, M. Stadler, “Digital Payment Systems with Passive Anonymity-Revoking Trustees,” Computer Security-ESORICS 96, volume 1146, pp. 33–43.
J. Camenisch, J-M. Piveteau, M. Stadler, “An Efficient Fair Payment System,” 3rd ACM Conf. on Comp. and Comm. Security, 1996, pp. 88–94.
D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, ACM 1981, pp. 84–88
D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology-Proceedings of Crypto’ 82, 1983, pp. 199–203.
D. Chaum, H. Van Antwerpen, “Undeniable Signatures,” Crypto’ 89, pp. 212–216
D. Chaum, A. Fiat and M. Naor, “Untraceable Electronic Cash,” Advances in Cryptology-Proceedings of Crypto’ 88, pp. 319–327.
Digicash, see http://www.digicash.com
G.I. Davida, Y. Frankel, Y. Tsiounis, and M. Yung, “Anonymity Control in ECash Systems,” Financial Cryptography 97.
Y. Frankel, Y. Tsiounis, and M. Yung, “Indirect Discourse Proofs: Achieving Efficient Fair Off-Line E-Cash,” Advances in Cryptology-Proceedings of Asiacrypt 96, pp. 286–300.
M. Franklin and M. Yung, “Towards Provably Secure Efficient Electronic Cash,” Columbia Univ. Dept of C.S. TR CUCS-018-92, April 24, 1992. (Also in Icalp-93, July 93, Lund Sweden, LNCS Springer Verlag).
M. Franklin and M. Yung, “Blind Weak Signatures and its Applications: Putting Non-Cryptographic Secure Computation to Work,” Advances in Cryptology-Proceedings of Eurocrypt’ 94
Gemplus, “Gemplus Public Key (GPK) Cards”, October 1996.
Hitachi, “Product directory: H8 Range”, 1997.
M. Jakobsson and M. Yung, “Revocable and Versatile Electronic Money,” 3rd ACM Conference on Comp. and Comm. Security, 1996, pp. 76–87.
M. Jakobsson and M. Yung, “Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System,” Financial Cryptography’ 97.
M. Jakobsson and M. Yung, ”Distributed ‘Magic Ink’ Signatures,” Eurocrypt’ 97, pp. 450–464
M. Jakobsson, “Privacy vs. Authenticity,” PhD Thesis, University of California, San Diego, Department of Computer Science and Engineering, 1997. Available at http://www-cse.ucsd.edu/users/markus/
M. Jakobsson, “A Practical Mix,” Eurocrypt’ 98, available at http://www.bell-labs.com/user/markusj/
S. Low, N. Maxemchuk, “Anonymous Credit Cards,” 2nd ACM Conference on Computer and Communications Security, 1994, pp. 108–117.
Mondex, see http://www.mondex.com
D. M’Raïhi, “Cost-Effective Payment Schemes with Privacy Regulation,” Advances in Cryptology-Proceedings of Asiacrypt’96.
National Institute for Standards and Technology, “Digital Signature Standard (DSS),” Federal Register Vol 56(169), Aug 30, 1991.
W. Ogata, K. Kurosawa, K. Sako, K. Takatani, “Fault Tolerant Anonymous Channel,” Information and Communications Security,’ 97, pp. 440–444
M. Reiter, A. Rubin, “Crowds: Anonymity for Web Transactions,” ACM Transactions on Information and System Security, April, 1998.
R. Rivest, A. Shamir and L. Adleman, “A method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, v. 21,2, Feb 1978, pp. 120–126.
Siemens, “ICs for Chip Cards”, Customer Information, June 1997.
D. Simon, “Anonymous Communication and Anonymous Cash,” Crypto’ 96, pp. 61–73.
S. von Solms and D. Naccache, “On Blind Signatures and Perfect Crimes,” Computers and Security, 111992 pp. 581–583.
M. Stadler, J-M. Piveteau, J. Camenisch, “Fair Blind Signatures,” Advances in Cryptology-Proceedings of Eurocrypt’ 95, 1995.
P. Syverson, D. Goldschlag, M. Reed, “Anonymous connections and onion routing,” IEEE Symposium on Security and Privacy, 1997.
B. Witter, “The Dark Side of Digital Cash,” Legal Times, January 30, 1995
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jacobson, M., M’Raïhi, D. (1999). Mix-Based Electronic Payments. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_13
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive