A Privacy Preserving Rental System

  • Yanjiang Yang
  • Beng Chin Ooi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3650)


Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concern, we present a privacy preserving rental system where interests of both the users and the service provider are protected. In particular, users are enabled to engage in a rental service in an anonymous manner; however, users who keep overdue rental items are subject to anonymity revocation. Moreover, to enforce rental limit we propose a new one-show anonymous credential scheme, tailored to the scenario of on-line credential issuing.


Privacy Anonymity Group signature One-show anonymous credential 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255–270. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Brickell, E., Gemmel, P., Kravitz, D.: Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change. In: Proc. 6th Annual ACM-SIAMs, pp. 457–466 (1995)Google Scholar
  3. 3.
    Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme. In: Proc. Financial Cryptography, pp. 319–338 (2001)Google Scholar
  4. 4.
    Brands, S.: Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy, PhD Thesis (1999)Google Scholar
  5. 5.
    Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Proc. Advances in Cryptology, Eurocrypt 2001, LNCS, vol. 1880, pp. 93–118 (2001)Google Scholar
  6. 6.
    Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Chaum, D.: Blind Signatures for Untraceable Payments. In: Proc. Advances in Cryptology, Crypto 1982, pp. 199–203 (1982)Google Scholar
  8. 8.
    Chaum, D.: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28(10), 1030–1044 (1985)CrossRefGoogle Scholar
  9. 9.
    Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  10. 10.
    Camenisch, J., Michels, M.: A Group Signature Scheme with Improved Efficiency. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 160–174. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  11. 11.
    Camenisch, J., Michels, M.: Proving in Zero-knowledge that A Number is the Product of Two Safe Primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107–122. Springer, Heidelberg (1999)Google Scholar
  12. 12.
    Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Sommer, G., Daniilidis, K., Pauli, J. (eds.) CAIP 1997. LNCS, vol. 1296, pp. 410–424. Springer, Heidelberg (1997)Google Scholar
  13. 13.
    Damagard, I., Fujisaki, E.: An Integer Commitment Scheme Based on Groups with Hidden Order. IACR Cryptology ePrint Archive 2001/064 (2001)Google Scholar
  14. 14.
    Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym Systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, p. 184. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  15. 15.
    Shigetomi, R., Otsuka, A., Ogawa, T., Imai, H.: An Anonymous Loan System Based on Group Signature Scheme. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 244–256. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  16. 16.
    Stadler, M., Piveteau, J.M., Camenisch, J.: Fair Blind Signatures. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 209–219. Springer, Heidelberg (1995)Google Scholar
  17. 17.
    Stubblebine, S.G., Syverson, P.F., Goldschlag, D.M.: Unlinkable Serial Transactions: Protocols and Applications. ACM Transactions on Information and System Security 2(4), 354–389 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yanjiang Yang
    • 2
    • 3
  • Beng Chin Ooi
    • 1
  1. 1.National University of Singapore 
  2. 2.Singapore Management University 
  3. 3.Institute for Infocomm Research 

Personalised recommendations