Fair Electronic Cash Based on a Group Signature Scheme

  • Greg Maitland
  • Colin Boyd
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2229)

Abstract

Several new groupsignature schemes have been proposed in recent years. In addition, several applications for group signatures (including electronic cash) have been suggested.

A new cash scheme based on a recent groupsignature by Ateniese, Camenisch, Joye and Tsudik is presented. Its construction uses a general framework suitable for a number of groupsignature schemes. We also identify the challenges faced by such schemes.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology-CRYPTO 2000, LNCS 1880, pages 255–270. Springer-Verlag, 2000.Google Scholar
  2. 2.
    Stefan Brands. Untraceable off-line cash in wallets with observers. In Advances in Cryptology-CRYPTO’93, LNCS 773, pages 302–318. Springer-Verlag, 1993.Google Scholar
  3. 3.
    A. Lysyanskaya and Z. Ramzan. Groupblind digital signatures: A scalable solution to electronic cash. In Financial Cryptography: Second International Conference, FC’ 98, LNCS 1465, pages 184–197. Springer-Verlag, 1998.Google Scholar
  4. 4.
    Toru Nakanishi, Nobuaki Haruna, and Yuji Sugiyama. Unlinkable electronic coupon protocol with anonymity control. In International Workshop on Information Security (ISW’99), LNCS 1729, pages 37–46, 1999.Google Scholar
  5. 5.
    DaeHun Nyang and JooSeok Song. Preventing double-spent coins from revealing user’s whole secret. In Second International Conference on Information Security and Cryptology (ICISC’99), LNCS 1787, pages 13–20. Springer-Verlag, 1999.Google Scholar
  6. 6.
    Jacques Traoré. Group signatures and their relevance to privacy-protecting off-line electronic cash systems. In Australasian Conference on Information Security and Privacy (ACISP’99), LNCS 1587, pages 228–243. Springer-Verlag, 1999.Google Scholar
  7. 7.
    S. von Solms and D. Naccache. Blind signatures and perfect crimes. Computers and Security, 11:581–583, 1992.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Greg Maitland
    • 1
  • Colin Boyd
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations