Abstract
This paper reveals a possible attack on the well-known protocol for anonymous currency exchange by David Chaum et al. We show that there is a possibility to spend a single coin many times, so that the bank does not have absolute certainity about a real abuser. In such a case the bank can determine a small group of potential abusers, but cannot indicate a specific person. This potential situation has serious consequences and leads to the conclusion that the system should not be used for irreversible off-line transactions. We also present a modification which could prevent that kind of attacks and enable the protocol to be used for off-line transactions without regard to the reversability.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brands, S.: Untraceable Off-line Cash in Wallets with Observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994)
Brands, S.: Off-Line Electronic Cash Based on Secret-Key Certificates. In: Baeza-Yates, R., Poblete, P.V., Goles, E. (eds.) LATIN 1995. LNCS, vol. 911, pp. 131–166. Springer, Heidelberg (1995)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of Crypto 1982, pp. 199–203. Springer (1983)
Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Deng, R.H., Han, Y., Jeng, A.B., Ngair, T.: A new on-line cash check scheme. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 111–116. ACM (1997)
Ferguson, N.: Single term off-line coins. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 318–328. Springer, Heidelberg (1994)
Goldwasser, S., Bellare, M.: Lecture Notes on Cryptography, Cambridge (2008)
Kim, S., Oh, H.: A new electronic check system with reusable refunds. International Journal of Information Security 1(3), 175–188 (2002)
Mao, W.: Blind Certification of Public Keys and Off-line Electronic Cash. Hawlett-Packard Laboratories (1996)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)
Ogiela, M.R., Ogiela, U.: Linguistic Protocols for Secure Information Management and Sharing. Computers and Mathematics with Applications 63(2), 564–572 (2012)
Ogiela, M.R., Ogiela, U.: Secure Information Management using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London (2014), doi:10.1007/978-1-4471-5016-9, ISSN 1610-3947, ISBN: 978-1-4471-5015-2
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley (1996)
Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley (2004)
Website of Bitcoin foundation developing virtual currency with the same name, http://bitcoin.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ogiela, M.R., Sułkowski, P. (2014). Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-662-44893-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44892-2
Online ISBN: 978-3-662-44893-9
eBook Packages: Computer ScienceComputer Science (R0)