On Methodology of E-wallet Construction for Partially Off-line Payment System | SpringerLink
Skip to main content

On Methodology of E-wallet Construction for Partially Off-line Payment System

  • Conference paper
  • First Online:
Information and Software Technologies (ICIST 2016)

Abstract

We propose a methodology for the construction of e-wallet with off-line divisible e-cash, with such properties as anonymity against vendor and full traceability from bank. Since this system is fully controlled by bank from the issuance of e-money to e-cash deposit, the prevention of an overpayment and the detection of a dishonest user are provided.

Proposed system prevents the serious drawback of existing anonymous and divisible e-cash systems noticed by Chaum, namely the growth of the amount of information during e-cash transfers among the users. The prevention of this issue is achieved by sacrificing such valuable properties of existing e-cash systems as an honest user’s anonymity against bank and off-line deposit.

The proof of the proposed construction’s security is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman and Hall/CRC, Washington (2008)

    MATH  Google Scholar 

  2. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  3. Rosenberg, B.: Handbook of Financial Cryptography and Security. Chapman and Hall/CRC, Washington (2011)

    MATH  Google Scholar 

  4. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001). doi:10.1007/3-540-44702-4_1

    Chapter  Google Scholar 

  5. Okamoto, T.: An efficient divisible electronic cash scheme. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 438–451. Springer, Heidelberg (1995). doi:10.1007/3-540-44750-4_35

    Google Scholar 

  6. Eng, T., Okamoto, T.: Single-term divisible electronic coins. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 306–319. Springer, Heidelberg (1995). doi:10.1007/BFb0053446

    Chapter  Google Scholar 

  7. Fan, C., Sun, W.Z., Hau, H.T.: Date Attachable Offline Electronic Cash Scheme, Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan (2014)

    Google Scholar 

  8. Pointcheval, D., Sanders, O., Traoré, J.S.: Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash (2015)

    Google Scholar 

  9. Canard, S., Pointcheval, D., Sanders, O., Traoré, J.: Divisible e-cash made practical. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 77–100. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46447-2_4

    Google Scholar 

  10. Brands, S.: An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323 1993, Centrum voor Wiskunde en Informatica (1993)

    Google Scholar 

  11. Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302–321. Springer, Heidelberg (2005). doi:10.1007/11426639_18

    Chapter  Google Scholar 

  12. Catalano, D., Gennaro, R., Howgrave-Graham, N.: The bit security of paillier’s encryption scheme and its applications. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 229–243. Springer, Heidelberg (2001). doi:10.1007/3-540-44987-6_15

    Chapter  Google Scholar 

  13. Paillier, P.: Paillier encryption and signature schemes. In: van Tilborg, H. (ed.) Encyclopedia of Cryptography and Security, p. 453. Springer, Heidelberg (2005)

    Google Scholar 

  14. Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: The state of the art in electronic payment systems, pp. 28–35 (1997)

    Google Scholar 

  15. Chaum, D., Pedersen, T.P.: Transferred cash grows in size. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 390–407. Springer, Heidelberg (1993). doi:10.1007/3-540-47555-9_32

    Chapter  Google Scholar 

  16. Hanatani, Y., Komano, Y., Oht, K., Kunihiro, N.: Provably secure untraceable electronic cash against insider attacks. IEICE Trans. 90-A(5), 980–991 (2007)

    Article  Google Scholar 

  17. Baseri, Y., Takhtaei, B., Mohajeri, J.: Secure untraceable off-line electronic cash system. Scientia Iranica 20(3), 637–646 (2013)

    Google Scholar 

  18. Wang, F., Chang, C.-C., Lin, C.: Security analysis on “secure untraceable off-line electronic cash system”. Int. J. Netw. Secur. 18(3), 454–458 (2016)

    Google Scholar 

  19. Canard, S., Gouget, A., Traoré, J.: Improvement of efficiency in (Unconditional) anonymous transferable e-cash. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 202–214. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85230-8_19

    Chapter  Google Scholar 

  20. Baldimtsi, F., Chase, M., Fuchsbauer, G., Kohlweiss, M.: Anonymous transferable e-cash. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 101–124. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46447-2_5

    Google Scholar 

  21. Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S.: Malleable signatures: new definitions and delegatable anonymous credentials. In: IEEE Computer Security Foundations Symposium (2014)

    Google Scholar 

  22. Canard, S., Gouget, A.: Divisible e-cash systems can be truly anonymous. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 482–497. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72540-4_28

    Chapter  Google Scholar 

  23. Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990). doi:10.1007/0-387-34799-2_25

    Chapter  Google Scholar 

  24. Rabin, M.O.: Digitalized Signatures, in Foundations of Secure Computation. Academic Press, New York (1978)

    Google Scholar 

  25. Tsiounis, Y.S.: Efficient electonic cash: new notions and techniques. Ph.D. thesis, Northeastern University, Boston, Massachusetts (1997)

    Google Scholar 

  26. Frankel, Y., Tsiounis, Y., Yung, M.: Fair off-line e-cash made easy. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 257–270. Springer, Heidelberg (1998). doi:10.1007/3-540-49649-1_21

    Chapter  Google Scholar 

  27. Brands, S.: Untraceable off-line cash in wallets with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994). doi:10.1007/3-540-48329-2_26

    Chapter  Google Scholar 

  28. Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  29. Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000). doi:10.1007/3-540-44598-6_14

    Chapter  Google Scholar 

  30. Vaudenay, S.: Decorrelation: a theory for block cipher security. J. Cryptology 16(4), 249–286 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  31. Wegman, M.N., Carter, J.L.: New hush functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265–279 (1981)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jonas Muleravičius .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Muleravičius, J., Sakalauskas, E., Timofejeva, I. (2016). On Methodology of E-wallet Construction for Partially Off-line Payment System. In: Dregvaite, G., Damasevicius, R. (eds) Information and Software Technologies. ICIST 2016. Communications in Computer and Information Science, vol 639. Springer, Cham. https://doi.org/10.1007/978-3-319-46254-7_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46254-7_61

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46253-0

  • Online ISBN: 978-3-319-46254-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics