Abstract
We propose a methodology for the construction of e-wallet with off-line divisible e-cash, with such properties as anonymity against vendor and full traceability from bank. Since this system is fully controlled by bank from the issuance of e-money to e-cash deposit, the prevention of an overpayment and the detection of a dishonest user are provided.
Proposed system prevents the serious drawback of existing anonymous and divisible e-cash systems noticed by Chaum, namely the growth of the amount of information during e-cash transfers among the users. The prevention of this issue is achieved by sacrificing such valuable properties of existing e-cash systems as an honest user’s anonymity against bank and off-line deposit.
The proof of the proposed construction’s security is provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman and Hall/CRC, Washington (2008)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16
Rosenberg, B.: Handbook of Financial Cryptography and Security. Chapman and Hall/CRC, Washington (2011)
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001). doi:10.1007/3-540-44702-4_1
Okamoto, T.: An efficient divisible electronic cash scheme. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 438–451. Springer, Heidelberg (1995). doi:10.1007/3-540-44750-4_35
Eng, T., Okamoto, T.: Single-term divisible electronic coins. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 306–319. Springer, Heidelberg (1995). doi:10.1007/BFb0053446
Fan, C., Sun, W.Z., Hau, H.T.: Date Attachable Offline Electronic Cash Scheme, Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan (2014)
Pointcheval, D., Sanders, O., Traoré, J.S.: Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash (2015)
Canard, S., Pointcheval, D., Sanders, O., Traoré, J.: Divisible e-cash made practical. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 77–100. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46447-2_4
Brands, S.: An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323 1993, Centrum voor Wiskunde en Informatica (1993)
Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302–321. Springer, Heidelberg (2005). doi:10.1007/11426639_18
Catalano, D., Gennaro, R., Howgrave-Graham, N.: The bit security of paillier’s encryption scheme and its applications. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 229–243. Springer, Heidelberg (2001). doi:10.1007/3-540-44987-6_15
Paillier, P.: Paillier encryption and signature schemes. In: van Tilborg, H. (ed.) Encyclopedia of Cryptography and Security, p. 453. Springer, Heidelberg (2005)
Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: The state of the art in electronic payment systems, pp. 28–35 (1997)
Chaum, D., Pedersen, T.P.: Transferred cash grows in size. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 390–407. Springer, Heidelberg (1993). doi:10.1007/3-540-47555-9_32
Hanatani, Y., Komano, Y., Oht, K., Kunihiro, N.: Provably secure untraceable electronic cash against insider attacks. IEICE Trans. 90-A(5), 980–991 (2007)
Baseri, Y., Takhtaei, B., Mohajeri, J.: Secure untraceable off-line electronic cash system. Scientia Iranica 20(3), 637–646 (2013)
Wang, F., Chang, C.-C., Lin, C.: Security analysis on “secure untraceable off-line electronic cash system”. Int. J. Netw. Secur. 18(3), 454–458 (2016)
Canard, S., Gouget, A., Traoré, J.: Improvement of efficiency in (Unconditional) anonymous transferable e-cash. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 202–214. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85230-8_19
Baldimtsi, F., Chase, M., Fuchsbauer, G., Kohlweiss, M.: Anonymous transferable e-cash. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 101–124. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46447-2_5
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S.: Malleable signatures: new definitions and delegatable anonymous credentials. In: IEEE Computer Security Foundations Symposium (2014)
Canard, S., Gouget, A.: Divisible e-cash systems can be truly anonymous. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 482–497. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72540-4_28
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990). doi:10.1007/0-387-34799-2_25
Rabin, M.O.: Digitalized Signatures, in Foundations of Secure Computation. Academic Press, New York (1978)
Tsiounis, Y.S.: Efficient electonic cash: new notions and techniques. Ph.D. thesis, Northeastern University, Boston, Massachusetts (1997)
Frankel, Y., Tsiounis, Y., Yung, M.: Fair off-line e-cash made easy. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 257–270. Springer, Heidelberg (1998). doi:10.1007/3-540-49649-1_21
Brands, S.: Untraceable off-line cash in wallets with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994). doi:10.1007/3-540-48329-2_26
Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)
Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000). doi:10.1007/3-540-44598-6_14
Vaudenay, S.: Decorrelation: a theory for block cipher security. J. Cryptology 16(4), 249–286 (2003)
Wegman, M.N., Carter, J.L.: New hush functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265–279 (1981)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Muleravičius, J., Sakalauskas, E., Timofejeva, I. (2016). On Methodology of E-wallet Construction for Partially Off-line Payment System. In: Dregvaite, G., Damasevicius, R. (eds) Information and Software Technologies. ICIST 2016. Communications in Computer and Information Science, vol 639. Springer, Cham. https://doi.org/10.1007/978-3-319-46254-7_61
Download citation
DOI: https://doi.org/10.1007/978-3-319-46254-7_61
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46253-0
Online ISBN: 978-3-319-46254-7
eBook Packages: Computer ScienceComputer Science (R0)