On the Anonymity of Banknotes

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3424)


In this paper we analyze the anonymity of banknote based payments. We show how to model intermediary-chains and present statistical methods that can be used by banks to extract information on the length of the chain from deposited banknotes. If the bank has discovered a chain of length zero, the anonymity of the payment is immediately revoked. To protect against such deanonymizations, customers have to be very careful when spending banknotes.


Serial Number Optical Character Recognition Blind Signature Criminal Investigation Anonymous Communication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BPS01]
    Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 30–45. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. [Cha81]
    Chaum, D.: Untraceable electronic mail, return adresses and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  3. [Cha83]
    Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology – CRYPTO 1982, pp. 199–203. Plenum (1983)Google Scholar
  4. [Fin03]
    Financial Action Task Force on Money Laundering. The fourty recommendations (2003), Online available at
  5. [Hit03]
    Hitachi μ solutions (2003), Online available at
  6. [Jak99]
    Jakobsson, M.: Mini-cash: A minimalistic approach to e-commerce. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 122–135. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  7. [JP03]
    Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. [Shm02]
    Shmatikov, V.: Probabilistic analysis of anonymity. In: 15th IEEE Computer Security Foundations Workshop, pp. 119–128. IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  9. [Sim96]
    Simon, D.R.: Anonymous communication and anonymous cash. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 61–73. Springer, Heidelberg (1996)Google Scholar
  10. [vSN92]
    Solms, B.v., Naccache, D.: On blind signatures and perfect crimes. Computers and Security 11(6), 581–583 (1992)CrossRefGoogle Scholar
  11. [WALS02]
    Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Network and Distributed System Security Symposium – NDSS 2002, Internet Society (2002)Google Scholar
  12. [Yos01]
    Yoshida, J.: Euro bank notes to embed RFID chips by 2005. EE Times (December 2001), Online availabe at

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  1. 1.Federal Office for Information SecurityBonnGermany

Personalised recommendations