A New Transferable Digital Cash Protocol Using Proxy Re-signature Scheme

  • M. Kavitha
  • N. R. Sunitha
  • B. B. Amberker
Part of the Communications in Computer and Information Science book series (CCIS, volume 250)


Electronic payment systems have turned out to be a smart and convenient way of making payments. Digital cash is an electronic payment system which is modeled after our real cash system. If the digital cash is transferable then it allows the user to spend an e-coin received in a prior payment immediately without having to contact the bank, that is, the bank remains off-line. In the previous digital cash systems which supported transferability, the digital cash size was growing with each transaction. In this paper, we propose a new digital cash protocol which uses a Forward-Secure Multi-use Unidirectional Proxy Re-signature Scheme to achieve transferability, without any increase in the digital cash size with each transfer. Our scheme enables a secure off-line transaction, thus enforcing user anonymity and transferability. A Trusted Third Party is used to prevent the double spending of the digital coins.


Transferability Off-line Anonymity Forward-Secure Multi-use Unidirectional Proxy Re-signature Double spending 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ma, C.G., Yang, Y.X.: Transferable off-line electronic cash. Jisuanji Xue-bao (Chin. J. Comput.) 28(3), 301–308 (2005)Google Scholar
  2. 2.
    Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of CRYPTO 1982, pp. 199–203 (1982)Google Scholar
  3. 3.
    Chaum, D., Pedersen, T.P.: Transferred Cash Grows in Size. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 390–407. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  4. 4.
    Tewari, H., O’Mahony, D., Peirce, M.: Reusable off-line electronic cash using secret splitting. In: Networks & Telecommunications Research Group, Computer Science Department, Trinity College, Dublin 2, IrelandGoogle Scholar
  5. 5.
    Wang, H., Zhang, Y.: A Protocol for Untraceable Electronic Cash. In: Lu, H., Zhou, A. (eds.) WAIM 2000. LNCS, vol. 1846, pp. 189–197. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  6. 6.
    Kavitha, Sunitha, M.N.R., Amberker, B.B.: A Divisible And Transferable Digital Cash protocol. IFRSA’s International Journal of Computing 1(3), 407–413 (2011)Google Scholar
  7. 7.
    Ferguson, N.: Single Term Off-Line Coins. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 318–328. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  8. 8.
    Sunitha, N.R., Amberker, B.B.: Multi-use Unidirectional Forward-Secure Proxy Re-Signature scheme. In: IEEE Workshop on Collaborative Security Technologies, CoSec 2009, Bangalore, India, December 9 (2009)Google Scholar
  9. 9.
    Brands, S.: An efficient off-line electronic cash system based on the representation problem. Centrum voor Wiskunde en Informatica, Computer Science/Department of Algorithmics and Architecture, Report CS- R (1993)Google Scholar
  10. 10.
    Sebastiaan, H., Von Solms, Naccache, D.: On blind signatures and perfect crimes. Computers & Security 11(6), 581–583 (1992)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • M. Kavitha
    • 1
  • N. R. Sunitha
    • 1
  • B. B. Amberker
    • 2
  1. 1.Department of Computer Science and EngineeringSiddaganga Institute of TechnologyTumkurIndia
  2. 2.Department of Computer Science and EngineeringNational Institute of TechnologyWarangalIndia

Personalised recommendations