Micro-payments via efficient coin-flipping

Extended abstract
  • Richard J. Lipton
  • Rafail Ostrovsky
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1465)


We present an authenticated coin-flipping protocol and its proof of security. We demonstrate the applicability of our scheme for online randomized micro-payment protocols. We also review some essential aspects of other micro-payment proposals (including SET, PayWord and MicroMint, PayTree, NetCheque, NetCash, Agora, NetCard, CAFE, Pederson's proposal, micro-iKP, Milicent, proposal of Jarecki-Odlyzko, proposal of Yacobi, SVP, DigiCash, Rivest's “Lottery tickets as Micro-Cash” and Wheeler's proposal) and compare it with our scheme.


Smart Card Lottery Ticket Protocol Execution Secure Electronic Transaction Future Round 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    R. Anderson, C. Manifavas, C. Sutherland “Netcard — a practical electronic cash system” In Fourth Cambridge Workshop on Security Protocols. Springer Verlag, Lecture Notes in Computer Science, April 1996. available online URL http://www.cl.cam.ac.uk/users/rja14/Google Scholar
  2. 2.
    Blum, M., “Coin Flipping over the Telephone,” IEEE COMPCON 1982, pp. 133–137.Google Scholar
  3. 3.
    M. Blum, and S. Micali “How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits” SIAM J. on Computing, Vol 13, 1984, pp. 850–864, FOCS 82.MATHMathSciNetCrossRefGoogle Scholar
  4. 4.
    J.P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. MjØlsnes, F. Muller, T. Pedersen, B. Pfitzmann, P. de Rooij, B. Schoenmakers, L. Vallée, and M. Waidner.Google Scholar
  5. 5.
    M. Bellare and O. Goldreich. “On defining proofs of knowledge.” Extended abstract in Advances in Cryptology — Crypto 92 Proceedings, Lecture Notes in Computer Science Vol. 740, E. Brickell ed, Springer-Verlag, 1993.Google Scholar
  6. 6.
    B. Cox, D. Tygar, M. Sirbu “NetBill security and transaction proptocol” First USENIX Workshop on Electronic Commerce, New York, July 1995. available online URL http://www.ini.cmu/NETBILL/home.htmlGoogle Scholar
  7. 7.
    L. Tang and S. Low “Chrg-http: A Tool for Micropayments on the World Wide Web” 6th USENIX Security Symposium, San Jose, CA July 1996.Google Scholar
  8. 8.
    D. Chaum “Achieving Electronic Privacy” Scientific American, pp. 96–101, August 1992.Google Scholar
  9. 9.
    D. Chaum, A. Fiat, M. Naor “Untracable electronic Cash” Crypto-89.Google Scholar
  10. 10.
    E. Gabber and A. Silberschatz “Agora: A Minimal Distributed Protocol for Electronic Commerce” USENIX Workshop on E-Commerce, Oakland CA Nov. 1996.Google Scholar
  11. 11.
    S. Glassman, M. Manasse, M. Abadai, P. Gauthier, and P. Sobalvarro “The milicent protocol for inexpensive electronic commerce” In Proc. of the forth International World Wide Web Conference”, 1995. available online URL http://www.research.digital.com/SRC/milicentGoogle Scholar
  12. 12.
    S. Goldwasser, S. Micali, and R. Rivest “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks”. SIAM Journal of Computing vol 17, No 2, (April 1988), pp. 281–308.MATHMathSciNetCrossRefGoogle Scholar
  13. 13.
    O. Goldreich, L. Levin “A hard-core predicate for all one-way functions.” In Porc. of 21st STOC, pp. 25–32 ACM 1989.Google Scholar
  14. 14.
    N. M. Haller “The S/KEY one-time password system. In ISOC 94.Google Scholar
  15. 15.
    R. Hauser, M. Steiner, M. Waidner “Micro-payments based on ikp” In 14th Worldwide Congress on Computer and Communication Security Protection, CNIT Paris-La defense France, June 1996. available online URL http://www.zurich.ibm.com./Technology/Security/publications/1996/HSW96-new.ps.gzGoogle Scholar
  16. 16.
    S. Jarecki, A. Adlyzko “An efficient micropayment system based on probabilistic polling” Conference proceedings of Financial Cryptography'97, February 1997, Anguilla, BWI.Google Scholar
  17. 17.
    L. Lamport “Password authentication with insecure communication” Communications of the ACVM, 24(11):770–771, November 1981.CrossRefGoogle Scholar
  18. 18.
    Mondex USA available online URL http://www2.mondexusa.com/Google Scholar
  19. 19.
    G. Medvinsky, C. Neuman NetCash: A design for practical electronic currency on the internet. In Proceeding sof the Second ACM Conference on Computer and Communcation Security Novemeber 1994.Google Scholar
  20. 20.
    M. Naor “Bit Commitment using Pseudo-Ranomness” Proc. CRYPTO 89.Google Scholar
  21. 21.
    C. Neuman, G. Medvinsky Requirements for network payment: The Netcheque prospective. In Proc. of IEEE COMCON, March 95. available online FTP ftp://prospero.isi/edu/pub/papers/security/Google Scholar
  22. 22.
    C. Jutla and M. Yung “Paytree: amortized signature for flexible micropayments” In Second USENIX workshop on Electronic Commerce, November 1996.Google Scholar
  23. 23.
    T. Pedersen “Electronic payments of small amounts” Technical Report DAIMI PB-495, Aarhus University, Computer Science Department, århus, Denmark, August 1995.Google Scholar
  24. 24.
    scR. Rivest “Lottery tickets as Micro-Cash” rump session talk at Financial Cryptography'97, February 1997, Anguilla, BWI.Google Scholar
  25. 25.
    R. Rivest “Electronic Lottery tickets as Micropayments” Proceedings of Financial Cryptography'97, LNCS series 1318, pp. 306–314.Google Scholar
  26. 26.
    R. Rivest “The MD5 message-digest algorithm” Internet Request for Comments, April 1992. RFC 1321. available online URL http://theory.lcs.mit.edu/rivest/publications.htmlGoogle Scholar
  27. 27.
    R. Rivest and A. Shamir “Payword and micromint: Two simple micropayment schemes” In fourth Cambridge workshop on security protocols. Springer Verlag, lecture Notes in Computer Science, April 1996. available online URL http://theory.lcs.mit.edu/rivest/publications.htmlGoogle Scholar
  28. 28.
    V. Shoup “On Fast and Provaaably Secure Message Authentication Based On Universal Hashing” CRYPTO-96.Google Scholar
  29. 29.
    J. Stern, S. Vaudenay “Small-Value-Payment: a Flexible Micropayment Scheme” Conference proceedings of Financial Cryptography '97, February 1997, Anguilla, BWI.Google Scholar
  30. 30.
    Visa and MasterCard “Secure Electronic Transactions (SET) specification, available online URL http://www.mastercard.com/setGoogle Scholar
  31. 31.
    D. Wheeler “Transactions using bets” in security protocols Int. Workshop, cambridge, UK April 1996. In LNCS 1189 pp. 89–92 available online URL http://www.cl.cam.ac.uk/users/cm213/Project/project_publ.htmlGoogle Scholar
  32. 32.
    Y. Yacobi “On the continuum between on-line and off-line e-cash systems — I” Conference proceedings of Financial Cryptography'97, February 1997, AnguillaGoogle Scholar
  33. 33.
    A.C. Yao “Theory and Applications of Trapdoor Functions” FOCS 82.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Richard J. Lipton
    • 1
    • 2
  • Rafail Ostrovsky
    • 3
  1. 1.Department of Computer SciencePrinceton UniversityPrinceton
  2. 2.BellcoreUSA
  3. 3.Bell Communications ResearchMorristownUSA

Personalised recommendations