Abstract
We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (e.g., in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several solutions that do achieve a reasonable level of double spending prevention, and analyse their efficiency under varying assumptions.
This research is/was partially supported by the research program Sentinels (www.sentinels.nl), project JASON (NIT.6677). Sentinels is being financed by Technology Foundation STW, the Netherlands Organization for Scientific Research (NWO), and the Dutch Ministry of Economic Affairs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: The state of the art in electronic payment systems. IEEE Computer 30(9), 28–35 (1997)
Back, A.: Hashcash - a denial of service counter-measure (1997), http://www.cypherspace.org/hashcash
Erdös, P., Frankl, P., Füredi, Z.: Families of finite sets in which no set is covered by the union of r others. Israel Journal of Mathematics 51(1-2), 79–89 (1985)
Garcia, F.D., Hoepman, J.-H.: Off-line karma: A decentralized currency for peer-to-peer and grid networks. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 364–377. Springer, Heidelberg (2005)
Hird, S.: Technical Solutions for Controlling Spam. In: AUUG 2002, Melbourne (2002)
Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: 46th FOCS 2005, pp. 585–595. IEEE Comp. Soc. Press, Los Alamitos (2005)
Jarecki, S., Odlyzko, A.: An efficient micropayment system based on probabilistic polling. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318, pp. 173–191. Springer, Heidelberg (1997)
Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Computing 11(4), 203–213 (1998)
Malkhi, D., Reiter, M., Wool, A., Wright, R.: Probabilistic Quorum Systems. Information and Computation 170(2), 184–206 (2001)
Mullender, S.J., Vitányi, P.M.B.: Distributed match-making. Algorithmica 3, 367–391 (1988)
O’Mahony, D., Peirce, M., Tewari, H.: Electronic Payment Systems. Artech House, Boston (1997)
Schneier, B., Shostack, A.: Breaking up is hard to do: Modelling security threats for smart cards. In: 1st USENIX Worksh. on Smartcard Tech., Chicago, IL, pp. 175–185. USENIX (1999)
Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: KARMA: a secure economic framework for peer-to-peer resource sharing. In: Proc. Workshop on the Economics of Peer-to-Peer Systems, Berkeley, California (2003), http://www.sims.berkeley.edu/research/conferences/p2pecon/
Yacobi, Y.: Risk management for e-cash systems with partial real-time audit. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 62–71. Springer, Heidelberg (1999)
Yang, B., Garcia-Molina, H.: PPay: micropayments for peer-to-peer systems. In: Atluri, V., Liu, P. (eds.) 10th CCS, Washington D.C., USA, pp. 300–310. ACM, New York (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hoepman, JH. (2010). Distributed Double Spending Prevention. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2007. Lecture Notes in Computer Science, vol 5964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17773-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-17773-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17772-9
Online ISBN: 978-3-642-17773-6
eBook Packages: Computer ScienceComputer Science (R0)