Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
How to construct random functions
Journal of the ACM (JACM)
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Anonymous one-time signatures and flexible untraceable electronic cash
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
A remark on signature scheme where forgery can be proved
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Practical and provably secure release of a secret and exchange of signatures
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secure and Efficient Off-Line Digital Money (Extended Abstract)
ICALP '93 Proceedings of the 20th International Colloquium on Automata, Languages and Programming
Communication Efficient Zero-Knowledge Proofs of Knowledge (With Applications to Electronic Cash)
STACS '92 Proceedings of the 9th Annual Symposium on Theoretical Aspects of Computer Science
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
How To Break and Repair A "Provably Secure" Untraceable Payment System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
New Protocols for Electronic Money
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Efficient Electronic Money (Extended Abstract)
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Proceedings of the 4th ACM conference on Computer and communications security
Optimal on-line algorithms for an electronic commerce money distribution system
Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms
Fair electronic cash withdrawal and change return for wireless networks
WMC '01 Proceedings of the 1st international workshop on Mobile commerce
Untraceable off-line electronic cash flow in e-commerce
ACSC '01 Proceedings of the 24th Australasian conference on Computer science
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
A Protocol for Untraceable Electronic Cash
WAIM '00 Proceedings of the First International Conference on Web-Age Information Management
Efficient Electronic Cash Using Batch Signatures
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Loyalty Program Scheme for Anonymous Payment System
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Spending Offline Divisible Coins with Combining Capability
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Risk Management for E-Cash Systems with Partial Real-Time Audit
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Money Conservation via Atomicity in Fair Off-Line E-Cash
ISW '99 Proceedings of the Second International Workshop on Information Security
Unlinkable Divisible Electronic Cash
ISW '00 Proceedings of the Third International Workshop on Information Security
Mini-Cash: A Minimalistic Approach to E-Commerce
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Decision Oracles are Equivalent to Matching Oracles
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Electronic Payments: Where Do We Go from Here?
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Linkability in Practical Electronic Cash Design
ISW '00 Proceedings of the Third International Workshop on Information Security
Improved Magic Ink Signatures Using Hints
FC '99 Proceedings of the Third International Conference on Financial Cryptography
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
Single-Term Divisible Electronic Cash Based on Bit Commitment
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Payment technologies for E-commerce
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
Authorization algorithms for the mobility of user-role relationship
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Implementing regular cash with blind fixed-value electronic coins
Computer Standards & Interfaces
Electronic commerce and the street performer protocol
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Divisible E-Cash Systems Can Be Truly Anonymous
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Advanced Permission-Role Relationship in Role-Based Access Control
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Practical Anonymous Divisible E-Cash from Bounded Accumulators
Financial Cryptography and Data Security
Recent Advances in Electronic Cash Design
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Automatic generation of sigma-protocols
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
PrETP: privacy-preserving electronic toll pricing
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
A new untraceable off-line electronic cash system
Electronic Commerce Research and Applications
Distributed paillier cryptosystem without trusted dealer
WISA'10 Proceedings of the 11th international conference on Information security applications
Privacy-preserving smart metering
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Pseudonymous PKI for ubiquitous computing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Towards secure mobile agent based e-cash system
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Group signatures with separate and distributed authorities
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
An efficient and divisible payment scheme for m-commerce
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Vulnerability of a mobile payment system proposed at WISA 2002
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Recoverable and untraceable e-cash
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Efficient schemes for anonymous yet authorized and bounded use of cloud resources
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Divisible e-cash in the standard model
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Hi-index | 0.00 |
Recently, several "divisible" untraceable off-line electronic cash schemes have been presented [8, 11, 19, 20]. This paper presents the first practical "divisible" untraceable off-line cash scheme that is "single-term" in which every procedure can be executed in the order of log N, where N is the precision of divisibility, i.e., N = (the total coin value)/(minimum divisible unit value). Therefore, our "divisible" off-line cash scheme is more efficient and practical than the previous schemes. For example, when N = 217 (e.g., the total value is about $ 1000, and the minimum divisible unit is 1 cent), our scheme requires only about 1 Kbyte of data be transfered from a customer to a shop for one payment and about 20 modular exponentiations for one payment, while all previous divisible cash schemes require more than several Kbytes of transfered data and more than 200 modular exponentiations for one payment.In addition, we prove the security of the proposed cash scheme under some cryptographic assumptions. Our scheme is the first "practical divisible" untraceable off-line cash scheme whose cryptographic security assumptions are theoretically clarified.