Double Spending Protection for E-Cash Based on Risk Management
Electronic cash is an attempt to replace and reproduce paper cash in electronic transactions that faces competing challenges when used either online or offline. In effect, while effective protection against double spending for e-cash can be achieved in online payment environments through real-time detection, this comes at the expense of efficiency, the bank representing in such case a performance bottleneck and single point of failure. In contrast, in offline payment environments, while efficiency is improved, double spending can be detected only after the fact, which can be very costly. We propose in this paper a risk management approach for double spending protection which allows suitable tradeoffs between efficiency and effectiveness. This involves using the service of a trader, who is a trusted third party that will cover the risk involved in offline payment transactions, against some remuneration. The main goal is to provide full coverage to users against losses related to invalid coins while avoiding or minimizing interactions with the bank. Since the trader will incur some risk by guaranteeing coins while she cannot communicate with the bank, a winning strategy is devised for the trader to mitigate such risk.
KeywordsRisk Management Blind Signature Winning Strategy Blind Signature Scheme Payment Transaction
Unable to display preview. Download preview PDF.
- 2.Wei, K., Smith, A.J., Chen, Y.F.R., Vo, B.: Whopay: A scalable and anonymous payment system for peer-to-peer environments. In: Proc. 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, p. 13. IEEE Computer Society, Los Alamitos (2006)Google Scholar
- 3.Gabber, E., Silberschatz, A.: Agora: A minimal distributed protocol for electronic commerce. In: Proc. 2nd USENIX Workshop on Electronic Commerce, Oakland, CA, pp. 223–232 (1996)Google Scholar
- 4.Hoepman, J.H., Jacobs, B.: Increased security through open source. CoRR: Computing Research Repository abs/0801.3924 (2008)Google Scholar
- 8.Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Kupcu, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: Workshop on Privacy in the Electronic Society (WPES 2007), Alexandrai, Virginia, USA (2007)Google Scholar
- 9.Osipkov, I., Vasserman, E.Y., Hopper, N., Kim, Y.: Combating double-spending using cooperative p2p systems. In: Proc. 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, Canada, p. 41. IEEE Computer Society, Los Alamitos (2007)Google Scholar
- 10.Lo, J.W., Hwang, M.S., Chu, Y.P.: An exchangeable e-cash schem by e-mint. In: Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, Kaohsiung, pp. 246–251 (2008)Google Scholar
- 11.Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, http://www.bitcoin.org/bitcoin.pdf
- 12.Law, L., Sabett, S., Solinas, J.: How to make a mint: the cryptography of anonymous electronic cash. Technical report, National Security Agency, Office of Information Security Research and Technology, Cryptology Division (1996)Google Scholar