Advertisement

Privacy Preserving Credit Systems

  • Sherman S. M. Chow
  • Russell W. F. Lai
  • Xiuhua Wang
  • Yongjun ZhaoEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9955)

Abstract

Credit card system has proven itself to be a convenient way for individuals to complete transactions. Despite its great benefits, credit card system also brings in great privacy risks to users. The card issuing bank knows the details of all transactions made by every user, including transaction date, amount, and merchant. These contain sensitive information of the users which may reveal their whereabouts, preferences, daily routines, etc. In this paper, we build privacy preserving credit card systems that hide the expenses of individual users from the bank, while preserving most of the features provided by the current credit card system at the same time.

Keywords

Accountable privacy Credit card e-cash Online banking Group signatures 

Notes

Acknowledgments

Sherman Chow is supported by the Early Career Award and the Early Career Scheme (CUHK 439713), and General Research Funds (CUHK 14201914) of the Research Grants Council, University Grant Committee of Hong Kong.

References

  1. 1.
    Abe, M., Chow, S.S.M., Haralambiev, K., Ohkubo, M.: Double-trapdoor anonymous tags for traceable signatures. Int. J. Inf. Secur. 12(1), 19–31 (2013)CrossRefGoogle Scholar
  2. 2.
    Androulaki, E., Bellovin, S.M.: An anonymous credit card system. In: Proceedings of 6th Inernational Conference on Trust, Privacy and Security in Digital Business, TrustBus 2009, Linz, Austria, 3–4 September 2009, pp. 42–51 (2009)Google Scholar
  3. 3.
    Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: State of the art in electronic payment systems. Adv. Comput. 53, 425–449 (2000)CrossRefGoogle Scholar
  4. 4.
    Au, M.H., Chow, S.S.M., Susilo, W.: Short e-cash. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 332–346. Springer, Heidelberg (2005). doi: 10.1007/11596219_27 CrossRefGoogle Scholar
  5. 5.
    Baldimtsi, F., Chase, M., Fuchsbauer, G., Kohlweiss, M.: Anonymous transferable e-cash. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 101–124. Springer, Heidelberg (2015). doi: 10.1007/978-3-662-46447-2_5 Google Scholar
  6. 6.
    Bellare, M., Garay, J.A., Hauser, R.C., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M.: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4), 611–627 (2000)CrossRefGoogle Scholar
  7. 7.
    Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: the case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005). doi: 10.1007/978-3-540-30574-3_11
  8. 8.
    Blazy, O., Canard, S., Fuchsbauer, G., Gouget, A., Sibert, H., Traoré, J.: Achieving optimal anonymity in transferable e-cash with a judge. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 206–223. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-21969-6_13 CrossRefGoogle Scholar
  9. 9.
    Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: 20th ACM STOC, Chicago, Illinois, USA, 2–4 May 1988, pp. 103–112. ACM Press (1988)Google Scholar
  10. 10.
    Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C.: Short accountable ring signatures based on DDH. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 243–265. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-24174-6_13 CrossRefGoogle Scholar
  11. 11.
    Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302–321. Springer, Heidelberg (2005). doi: 10.1007/11426639_18 CrossRefGoogle Scholar
  12. 12.
    Canard, S., Gouget, A.: Anonymity in transferable e-cash. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 207–223. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-68914-0_13 CrossRefGoogle Scholar
  13. 13.
    Capgemini, Royal Bank of Scotland. World payments report (2015). https://www.fr.capgemini-consulting.com/resource-file-access/resource/pdf/world_payments_report_2015_vfinal.pdf. Accessed 18 July 2016
  14. 14.
    Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.), CRYPTO 1982, Santa Barbara, CA, USA, pp. 199–203. Plenum Press, New York (1982)Google Scholar
  15. 15.
    Chow, S.S.M.: Running on karma – P2P reputation and currency systems. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 146–158. Springer, Heidelberg (2007). doi: 10.1007/978-3-540-76969-9_10 CrossRefGoogle Scholar
  16. 16.
    Chow, S.S.M.: Real traceable signatures. In: Knudsen, L.R., Wu, H. (eds.) SAC 2009. LNCS, vol. 5867, pp. 92–107. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-05445-7_6 CrossRefGoogle Scholar
  17. 17.
    Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable constant-size fair e-cash. In: Reiter, M., Naccache, D. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226–247. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-10433-6_15 CrossRefGoogle Scholar
  18. 18.
    Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Krawczyk, H.: Blinding of credit card numbers in the SET protocol. In: Hirschfeld, R. (ed.) FC 1999. LNCS, vol. 1648, pp. 17–28. Springer, Heidelberg (1999). doi: 10.1007/3-540-48390-X_2 CrossRefGoogle Scholar
  20. 20.
    Lai, R.W.F., Zhang, T., Chow, S.S.M., Schröder, D.: Efficient sanitizable signatures without random oracles. In: Proceedings of Computer Security - ESORICS 2016–21st European Symposium on Research in Computer Security, Heraklion, Crete, Greece, 28–30 September 2016 (2016, to appear)Google Scholar
  21. 21.
    Low, S.H., Paul, S., Maxemchuk, N.F.: Anonymous credit cards. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, CCS 1994, Fairfax, Virginia, USA, 2–4 November 1994, pp. 108–117 (1994)Google Scholar
  22. 22.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  23. 23.
    Okamoto, T., Ohta, K.: Disposable zero-knowledge authentications and their applications to untraceable electronic cash. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435. Springer, Heidelberg (1990)Google Scholar
  24. 24.
    Okamoto, T., Ohta, K.: Universal electronic cash. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 324–337. Springer, Heidelberg (1992). doi: 10.1007/3-540-46766-1_27 Google Scholar
  25. 25.
    Tewari, H., Hughes, A.: Fully anonymous transferable ecash. IACR Cryptology ePrint Archive 2016:107 (2016)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Sherman S. M. Chow
    • 1
  • Russell W. F. Lai
    • 1
  • Xiuhua Wang
    • 1
  • Yongjun Zhao
    • 1
    Email author
  1. 1.Department of Information EngineeringThe Chinese University of Hong KongSha TinHong Kong

Personalised recommendations