Advertisement

Double Spending Protection for E-Cash Based on Risk Management

  • Patricia Everaere
  • Isabelle Simplot-Ryl
  • Issa Traoré
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6531)

Abstract

Electronic cash is an attempt to replace and reproduce paper cash in electronic transactions that faces competing challenges when used either online or offline. In effect, while effective protection against double spending for e-cash can be achieved in online payment environments through real-time detection, this comes at the expense of efficiency, the bank representing in such case a performance bottleneck and single point of failure. In contrast, in offline payment environments, while efficiency is improved, double spending can be detected only after the fact, which can be very costly. We propose in this paper a risk management approach for double spending protection which allows suitable tradeoffs between efficiency and effectiveness. This involves using the service of a trader, who is a trusted third party that will cover the risk involved in offline payment transactions, against some remuneration. The main goal is to provide full coverage to users against losses related to invalid coins while avoiding or minimizing interactions with the bank. Since the trader will incur some risk by guaranteeing coins while she cannot communicate with the bank, a winning strategy is devised for the trader to mitigate such risk.

Keywords

Risk Management Blind Signature Winning Strategy Blind Signature Scheme Payment Transaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Simplot-Ryl, I., Traoré, I., Everaere, P.: Distributed architectures for electronic cash schemes: A survey. International Journal of Parallel, Emergent and Distributed Systems (IJPEDS) 24(3), 243–271 (2009)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Wei, K., Smith, A.J., Chen, Y.F.R., Vo, B.: Whopay: A scalable and anonymous payment system for peer-to-peer environments. In: Proc. 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, p. 13. IEEE Computer Society, Los Alamitos (2006)Google Scholar
  3. 3.
    Gabber, E., Silberschatz, A.: Agora: A minimal distributed protocol for electronic commerce. In: Proc. 2nd USENIX Workshop on Electronic Commerce, Oakland, CA, pp. 223–232 (1996)Google Scholar
  4. 4.
    Hoepman, J.H., Jacobs, B.: Increased security through open source. CoRR: Computing Research Repository abs/0801.3924 (2008)Google Scholar
  5. 5.
    Jarecki, S., Odlyzko, A.M.: An efficient micropayment system based on probabilistic polling. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318, pp. 173–192. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  6. 6.
    Yacobi, Y.: On the continuum between on-line and off-line e-cash systems. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318, pp. 193–202. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  7. 7.
    Yacobi, Y.: Risk management for e-cash systems with partial real-time audit. Netnomics 3, 119–127 (2001)CrossRefGoogle Scholar
  8. 8.
    Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Kupcu, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: Workshop on Privacy in the Electronic Society (WPES 2007), Alexandrai, Virginia, USA (2007)Google Scholar
  9. 9.
    Osipkov, I., Vasserman, E.Y., Hopper, N., Kim, Y.: Combating double-spending using cooperative p2p systems. In: Proc. 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, Canada, p. 41. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  10. 10.
    Lo, J.W., Hwang, M.S., Chu, Y.P.: An exchangeable e-cash schem by e-mint. In: Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, Kaohsiung, pp. 246–251 (2008)Google Scholar
  11. 11.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, http://www.bitcoin.org/bitcoin.pdf
  12. 12.
    Law, L., Sabett, S., Solinas, J.: How to make a mint: the cryptography of anonymous electronic cash. Technical report, National Security Agency, Office of Information Security Research and Technology, Cryptology Division (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Patricia Everaere
    • 1
  • Isabelle Simplot-Ryl
    • 1
  • Issa Traoré
    • 2
  1. 1.CNRS UMR 8022 LIFLUniv Lille Nord de France, USTLFrance
  2. 2.Dep. of Electrical and Computer EngineeringUniversity of VictoriaCanada

Personalised recommendations