Skip to main content

Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 448))

Abstract

This paper reveals a possible attack on the well-known protocol for anonymous currency exchange by David Chaum et al. We show that there is a possibility to spend a single coin many times, so that the bank does not have absolute certainity about a real abuser. In such a case the bank can determine a small group of potential abusers, but cannot indicate a specific person. This potential situation has serious consequences and leads to the conclusion that the system should not be used for irreversible off-line transactions. We also present a modification which could prevent that kind of attacks and enable the protocol to be used for off-line transactions without regard to the reversability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brands, S.: Untraceable Off-line Cash in Wallets with Observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  2. Brands, S.: Off-Line Electronic Cash Based on Secret-Key Certificates. In: Baeza-Yates, R., Poblete, P.V., Goles, E. (eds.) LATIN 1995. LNCS, vol. 911, pp. 131–166. Springer, Heidelberg (1995)

    Google Scholar 

  3. Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of Crypto 1982, pp. 199–203. Springer (1983)

    Google Scholar 

  4. Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  5. Deng, R.H., Han, Y., Jeng, A.B., Ngair, T.: A new on-line cash check scheme. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 111–116. ACM (1997)

    Google Scholar 

  6. Ferguson, N.: Single term off-line coins. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 318–328. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  7. Goldwasser, S., Bellare, M.: Lecture Notes on Cryptography, Cambridge (2008)

    Google Scholar 

  8. Kim, S., Oh, H.: A new electronic check system with reusable refunds. International Journal of Information Security 1(3), 175–188 (2002)

    Article  MATH  Google Scholar 

  9. Mao, W.: Blind Certification of Public Keys and Off-line Electronic Cash. Hawlett-Packard Laboratories (1996)

    Google Scholar 

  10. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)

    Google Scholar 

  11. Ogiela, M.R., Ogiela, U.: Linguistic Protocols for Secure Information Management and Sharing. Computers and Mathematics with Applications 63(2), 564–572 (2012)

    Article  MathSciNet  Google Scholar 

  12. Ogiela, M.R., Ogiela, U.: Secure Information Management using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London (2014), doi:10.1007/978-1-4471-5016-9, ISSN 1610-3947, ISBN: 978-1-4471-5015-2

    Google Scholar 

  13. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley (1996)

    Google Scholar 

  14. Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley (2004)

    Google Scholar 

  15. Website of Bitcoin foundation developing virtual currency with the same name, http://bitcoin.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ogiela, M.R., Sułkowski, P. (2014). Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44893-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44892-2

  • Online ISBN: 978-3-662-44893-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics