Prepaid electronic cheques using public-key certificates
An electronic payment system which emulates the payments relying on classical cheques is presented. Its main features are a high computational efficiency and low storage requirements for the tamper resistant smart card implementing the purse of the user. This is achieved using a counter-based solution in combination with public-key certificates that represent the electronic cheques. To simplify both the withdrawal and the deposit stage we renounce to provide the untraceability feature. Our payment system is built around the Guillou-Quisquater identification/signature scheme in an RSA-group.
KeywordsSmart Card Signature Scheme Payment System Replay Attack Blind Signature Scheme
Unable to display preview. Download preview PDF.
- 1.S. Brands, Off-line cash transfer by smart cards, Report CS-R9323, Centrum voor Wiskunde en Informatica, March 1993.Google Scholar
- 2.S. Brands, “Untraceable off-line cash in wallet with observers,” Advances in Cryptology, Proc. Crypto'93, LNCS 773, D. Stinson, Ed., Springer-Verlag, 1994, pp. 302–318.Google Scholar
- 3.S. Brands, “Off-line cash transfer by smart cards,” Proc. First Smart Card Research and Advanced Application Conference, V. Cordonnier and J.-J. Quisquater, Eds., Lille (F), 1994, pp. 101–117.Google Scholar
- 4.D. Chaum, A. Fiat, M. Naor, “Untraceable electronic cash,” Advances in Cryptology, Proc. Crypto'88, LNCS 403, S. Goldwasser, Ed., Springer-Verlag, 1990, pp. 319–327.Google Scholar
- 5.D. Chaum, B. den Boer, E. van Heijst, S. Mjølsnes, and A. Steenbeek, “Efficient off-line electronic checks,” Advances in Cryptology, Proc. Eurocrypt'89, LNCS 434, J.-J. Quisquater and J. Vandewalle, Eds., Springer-Verlag, 1990, pp. 294–301.Google Scholar
- 6.D. Chaum, “Achieving electronic privacy,” Scientific American, Vol. 267, No. 2, 1992, pp. 96–101.Google Scholar
- 7.A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” Advances in Cryptology, Proc. Crypto'86, LNCS 263, A.M. Odlyzko, Ed., Springer-Verlag, 1987, pp. 186–194.Google Scholar
- 8.L.C. Guillou and J.-J. Quisquater, “A ‘paradoxical’ identity-based signature scheme resulting from zero-knowledge,” Advances in Cryptology, Proc. Crypto'88, LNCS 403, S. Goldwasser, Ed., Springer-Verlag, 1990, pp. 216–231.Google Scholar
- 9.L.C. Guillou, M. Ugon, and J.-J. Quisquater, “The smart Card: A standardized security device dedicated to public cryptology,” in “Contemporary Cryptology: The Science of Information Integrity,” G. J. Simmons, Ed., IEEE Press, 1991, pp. 561–613.Google Scholar
- 10.B. Preneel, Analysis and design of cryptographic hash functions, PhD thesis, Katholieke Universiteit Leuven, ESAT Department, Leuven (B), January 1993.Google Scholar