Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
On blind signatures and perfect crimes
Computers and Security
Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Electronic Money (Extended Abstract)
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Cost-Effective Payment Schemes with Privacy Regulation
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Micro-digital money for electronic commerce
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Unconditionally secure cryptosystems based on quantum cryptography
Information Sciences: an International Journal
Hi-index | 0.00 |
This paper proposes a novel escrow electronic cash system based on Yacobi's scheme. The system retains the anonymity characteristic of electronic cash. However, we added several protocols to make the investigators have the ability to trace the owner of the cash, the message sender and the message receiver through the escrow agents when necessary. For example, the government can trace "launderd" money, which is traded in the illegal or terroristic activities. More importantly, the escrow agent in this scheme is not involved in any normal transaction, so our system prevents excessive interference from the government. Thereafter the added protocols do not generally increase the trading time while compared with Yacobi's system.