Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Anonymous one-time signatures and flexible untraceable electronic cash
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Divertible zero knowledge interactive proofs and commutative random self-reducibility
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
How To Break and Repair A "Provably Secure" Untraceable Payment System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
ESIGN: an efficient digital signature implementation for smart cards
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
A new on-line cash check scheme
Proceedings of the 4th ACM conference on Computer and communications security
Proceedings of the 4th ACM conference on Computer and communications security
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
Fair electronic cash withdrawal and change return for wireless networks
WMC '01 Proceedings of the 1st international workshop on Mobile commerce
Efficient Electronic Cash Using Batch Signatures
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Loyalty Program Scheme for Anonymous Payment System
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Making Electronic Refunds Safer
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Extensions of Single-term Coins
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Divisible Electronic Cash Scheme
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Anonymous Communication and Anonymous Cash
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Risk Management for E-Cash Systems with Partial Real-Time Audit
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Money Conservation via Atomicity in Fair Off-Line E-Cash
ISW '99 Proceedings of the Second International Workshop on Information Security
Efficient Transferable Cash with Group Signatures
ISC '01 Proceedings of the 4th International Conference on Information Security
Mini-Cash: A Minimalistic Approach to E-Commerce
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Electronic Payments: Where Do We Go from Here?
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Linkability in Practical Electronic Cash Design
ISW '00 Proceedings of the Third International Workshop on Information Security
Single-Term Divisible Electronic Cash Based on Bit Commitment
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Payment technologies for E-commerce
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Fair blind threshold signatures in wallet with observers
Journal of Systems and Software
An escrow electronic cash system with limited traceability
Information Sciences—Informatics and Computer Science: An International Journal
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Digital coins: fairness implemented by observer
Journal of Theoretical and Applied Electronic Commerce Research
Electronic commerce and the street performer protocol
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
General-purpose digital ticket framework
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
Divisible E-Cash Systems Can Be Truly Anonymous
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Practical Anonymous Divisible E-Cash from Bounded Accumulators
Financial Cryptography and Data Security
Recent Advances in Electronic Cash Design
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Distributed architectures for electronic cash schemes: a survey
International Journal of Parallel, Emergent and Distributed Systems
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Transferable Constant-Size Fair E-Cash
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A practical anonymous off-line multi-authority payment scheme
Electronic Commerce Research and Applications
Ownership-attached unblinding of blind signatures for untraceable electronic cash
Information Sciences: an International Journal
Transferred cash grows in size
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A fully anonymous electronic payment scheme for B2B
ICWE'03 Proceedings of the 2003 international conference on Web engineering
Digital signature schemes with restriction on signing capability
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Anonymity in transferable e-cash
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Secure electronic bills of lading: blind counts and digital signatures
Electronic Commerce Research
A new untraceable off-line electronic cash system
Electronic Commerce Research and Applications
Achieving optimal anonymity in transferable e-cash with a judge
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Electronic cash with anonymous user suspension
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A universally composable scheme for electronic cash
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
An efficient and divisible payment scheme for m-commerce
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Vulnerability of a mobile payment system proposed at WISA 2002
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Recoverable and untraceable e-cash
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Partially blind threshold signatures based on discrete logarithm
Computer Communications
Research note: Date attachable electronic cash
Computer Communications
Research note: On the security of fair blind signature scheme using oblivious transfer
Computer Communications
Randomization enhanced Chaum's blind signature scheme
Computer Communications
Divisible e-cash in the standard model
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
International Journal of Information and Communication Technology
Hi-index | 0.00 |
This paper proposes the first ideal untraceable electronic cash system which solves the most crucial problem inherent with real cash and all previous untraceable electronic cash systems. The main advantage of the new system is that the customer can subdivide his cash balance, C (dollars), into many pieces in any way he pleases until the total value of all subdivided piece equals C. This system can be implemented efficiently. In a typical implementation, the data size of one piece of electronic cash is less than 100 bytes regardless of the face value of piece, the computation time for each transaction is several seconds, assuming the existence of a Rabin scheme chip. The security of this scheme relies on the difficulty of factoring.