Achieving Optimal Anonymity in Transferable E-Cash with a Judge

  • Olivier Blazy
  • Sébastien Canard
  • Georg Fuchsbauer
  • Aline Gouget
  • Hervé Sibert
  • Jacques Traoré
Conference paper

DOI: 10.1007/978-3-642-21969-6_13

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6737)
Cite this paper as:
Blazy O., Canard S., Fuchsbauer G., Gouget A., Sibert H., Traoré J. (2011) Achieving Optimal Anonymity in Transferable E-Cash with a Judge. In: Nitaj A., Pointcheval D. (eds) Progress in Cryptology – AFRICACRYPT 2011. AFRICACRYPT 2011. Lecture Notes in Computer Science, vol 6737. Springer, Berlin, Heidelberg

Abstract

Electronic cash (e-cash) refers to money exchanged electronically. The main features of traditional cash are usually considered desirable also in the context of e-cash. One such property is off-line transferability, meaning the recipient of a coin in a transaction can transfer it in a later payment transaction to a third person without contacting a central authority. Among security properties, the anonymity of the payer in such transactions has been widely studied. This paper proposes the first efficient and secure transferable e-cash scheme with the strongest achievable anonymity properties, introduced by Canard and Gouget. In particular, it should not be possible for adversaries who receive a coin to decide whether they have owned that coin before. Our proposal is based on two recent cryptographic primitives: the proof system by Groth and Sahai, whose randomizability enables strong anonymity, and the commuting signatures by Fuchsbauer, which allow one to sign values that are only given as encryptions.

Keywords

Transferable e-cash anonymity Groth-Sahai proofs commuting signatures 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Olivier Blazy
    • 1
  • Sébastien Canard
    • 2
  • Georg Fuchsbauer
    • 3
  • Aline Gouget
    • 4
  • Hervé Sibert
    • 5
  • Jacques Traoré
    • 2
  1. 1.École Normale Supérieure – CNRS – INRIAParisFrance
  2. 2.Orange Labs – Applied Crypto GroupCaenFrance
  3. 3.Dept. Computer ScienceUniversity of BristolUK
  4. 4.Gemalto – Security LabMeudonFrance
  5. 5.ST-EricssonLe MansFrance

Personalised recommendations