Skip to main content

On Anonymous Electronic Cash and Crime

  • Conference paper
  • First Online:
Information Security (ISW 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1729))

Included in the following conference series:

Abstract

Anonymous electronic cash systems can be vulnerable to criminal abuse. Two approaches were suggested for solving this problem. In an escrowed cash system users are given anonymity which can be lifted by trustees. In an amount-limited system each user enjoys unconditional anonymity but only for payments up to a limited amount during a given time-frame. In this paper we discuss the two approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. FATF-VII report on money laundering typologies, August 1996. http://www.treas.gov/fincen/pubs.html.

  2. FATF-IX report on money laundering typologies, Febuary 1998. http://www.ustreas.gov/fincen/typo97en.html.

  3. David Chaum. Blind signatures for untraceable payments. In Crypto 82, pages 199–203, 1982.

    MATH  Google Scholar 

  4. E. Fujisaki and T. Okamoto. Practical escrow cash system. Lecture Notes in Computer Science, 1189, 1997.

    Google Scholar 

  5. General Accounting Office (GAO). Private banking: Raul Salinas, Citibank, and alleged money laundering. GAO/OSI-99-1, December 1998. http://www.gao.gov/monthly.list/dec98/dec9811.htm.

  6. M. Jakobsson and J. Muller. Improved magic ink signatures using hints. In Financial Cryptography, 1999.

    Google Scholar 

  7. M. Jakobsson and M. Yung. Revokable and versatile electronic mony. In 3rd ACM Conference on Computer and Communications Security, pages 76–87, 1996.

    Google Scholar 

  8. R.C. Molander, D.A. Mussington, and P. Wilson. Cyberpayments and money laundering. RAND, 1998. http://www.rand.org/publications/MR/MR965/MR965.pdf/.

  9. H. Peterson and G. Poupard. Efficient scalable fair cash with off-line extortion prevention. Lecture Notes in Computer Science, 1334, 1997.

    Google Scholar 

  10. T. Sander and A. Ta-Shma. Auditable, anonymous electronic cash. In Crypto, 1999.

    Google Scholar 

  11. T. Sander and A. Ta-Shma. A new approach for anonymity control in electronic cash systems. In Financial Cryptography, 1999.

    Google Scholar 

  12. Bonni G. Tischler. The Colombian black market Peso exchange. Testimony before the Senate Caucus on International Narcotics Control, June 1999. http://jya.com/bmpe062199.htm.

  13. S. von Solms and D. Naccache. On blind signatures and perfect crimes. Computers and Security, 11(6):581–583, October 1992.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sander, T., Ta-Shma, A. (1999). On Anonymous Electronic Cash and Crime. In: Information Security. ISW 1999. Lecture Notes in Computer Science, vol 1729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47790-X_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-47790-X_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66695-0

  • Online ISBN: 978-3-540-47790-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics