Skip to main content

Distributed Double Spending Prevention

  • Conference paper
Security Protocols (Security Protocols 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5964))

Included in the following conference series:

Abstract

We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (e.g., in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several solutions that do achieve a reasonable level of double spending prevention, and analyse their efficiency under varying assumptions.

This research is/was partially supported by the research program Sentinels (www.sentinels.nl), project JASON (NIT.6677). Sentinels is being financed by Technology Foundation STW, the Netherlands Organization for Scientific Research (NWO), and the Dutch Ministry of Economic Affairs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: The state of the art in electronic payment systems. IEEE Computer 30(9), 28–35 (1997)

    Article  Google Scholar 

  2. Back, A.: Hashcash - a denial of service counter-measure (1997), http://www.cypherspace.org/hashcash

  3. Erdös, P., Frankl, P., Füredi, Z.: Families of finite sets in which no set is covered by the union of r others. Israel Journal of Mathematics 51(1-2), 79–89 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  4. Garcia, F.D., Hoepman, J.-H.: Off-line karma: A decentralized currency for peer-to-peer and grid networks. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 364–377. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Hird, S.: Technical Solutions for Controlling Spam. In: AUUG 2002, Melbourne (2002)

    Google Scholar 

  6. Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: 46th FOCS 2005, pp. 585–595. IEEE Comp. Soc. Press, Los Alamitos (2005)

    Google Scholar 

  7. Jarecki, S., Odlyzko, A.: An efficient micropayment system based on probabilistic polling. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318, pp. 173–191. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  8. Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Computing 11(4), 203–213 (1998)

    Article  MATH  Google Scholar 

  9. Malkhi, D., Reiter, M., Wool, A., Wright, R.: Probabilistic Quorum Systems. Information and Computation 170(2), 184–206 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  10. Mullender, S.J., Vitányi, P.M.B.: Distributed match-making. Algorithmica 3, 367–391 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  11. O’Mahony, D., Peirce, M., Tewari, H.: Electronic Payment Systems. Artech House, Boston (1997)

    Google Scholar 

  12. Schneier, B., Shostack, A.: Breaking up is hard to do: Modelling security threats for smart cards. In: 1st USENIX Worksh. on Smartcard Tech., Chicago, IL, pp. 175–185. USENIX (1999)

    Google Scholar 

  13. Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: KARMA: a secure economic framework for peer-to-peer resource sharing. In: Proc. Workshop on the Economics of Peer-to-Peer Systems, Berkeley, California (2003), http://www.sims.berkeley.edu/research/conferences/p2pecon/

  14. Yacobi, Y.: Risk management for e-cash systems with partial real-time audit. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 62–71. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  15. Yang, B., Garcia-Molina, H.: PPay: micropayments for peer-to-peer systems. In: Atluri, V., Liu, P. (eds.) 10th CCS, Washington D.C., USA, pp. 300–310. ACM, New York (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hoepman, JH. (2010). Distributed Double Spending Prevention. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2007. Lecture Notes in Computer Science, vol 5964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17773-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17773-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17772-9

  • Online ISBN: 978-3-642-17773-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics