Abstract
We propose a simple and efficient Subscription Scheme, allowing a set of users to anonymously pay for and request access to different services offered by a number of service providers. Using an e-cash system in such a scenario, the identity of the user would be hid into the e-coin in order to preserve its anonymity. Providing an additional triggering mechanism that opens this identity in case of double spending, also the service provider will be protected against fraud. Note that in traditional e-cash universality of the coin is required, however, in our scenario, the use of the token is completely determined at issuing time (yet this final aim remains hidden to the issuing authority). This allows for our construction, in which moreover fraud detection here implies no loss of anonymity; as we make access tokens independent of the owner in a quite simple and efficient way. On the other hand, if different usages of the same token are allowed, these are fully traceable by the service providers. An application to e-polling protocols is also given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chaum, D.: Blind Signatures for Untraceable Payments. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 199–203. Springer, Heidelberg (1990)
Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Brands, S.A.: Untraceable Off-Line Cash in Wallets with Observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994)
Ferguson, N.: Single Term Off-Line Coins. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 318–328. Springer, Heidelberg (1994)
Camenish, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trustees. J. of Comp. Security 5, 254–265 (1997)
von Solms, S., Naccache, D.: On Blind Signatures and Perfect Crimes. Computers & Security 11, 581–583 (1992)
Jakobsson, M., Yung, M.: Revokable and versatile electronic money. In: Proc. of the 3rd CCCS, vol. 765, pp. 76–87. ACM Press (1996)
Chang, C.C., Hwang, T.: Anonymous proof of membership with ring signature. In: Proc. of the 2005 IEEE Int. Conf. on Electro Info. Tech., pp. 5–9 (2005)
Fujii, A., Ohtake, G., Hanaoka, G., Ogawa, K.: Anonymous Authentication Scheme for Subscription Services. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part III. LNCS (LNAI), vol. 4694, pp. 975–983. Springer, Heidelberg (2007)
Damgård, I., Dupont, K., Pedersen, M.Ø.: Unclonable Group Identification. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 555–572. Springer, Heidelberg (2006)
Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clone wars: Efficient periodic n-times anonymous authentication. Cryptology ePrint Archive, Report 2006/454 (2006) http://eprint.iacr.org/
Blanton, M.: Online subscriptions with anonymous access. In: Proc. of the 2008 ACM Symp. on Inf., Comp. and Communications Security, pp. 217–227 (2008)
Groth, J., Sahai, A.: Efficient Non-Interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008)
Ramzan, Z., Ruhl, M.: Protocols for anonymous subscripton services. Unpublished manuscript. At the time of writing (2000), http://people.csail.mit.edu/ruhl/papers/drafts/subscription.pdf/
Pointcheval, D., Stern, J.: Provably Secure Blind Signature Schemes. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 252–265. Springer, Heidelberg (1996)
Shoup, V.: OAEP reconsidered. J. of Cryptology 15, 223–249 (2008)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24, 84–88 (1981)
Bruschi, D., Fovino, I.N., Lanzi, A.: A Protocol for Anonymous and Accurate E-Polling. In: Böhlen, M.H., Gamper, J., Polasek, W., Wimmer, M.A. (eds.) TCGOV 2005. LNCS (LNAI), vol. 3416, pp. 112–121. Springer, Heidelberg (2005)
Juels, A., Luby, M., Ostrovsky, R.: Security of Blind Digital Signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150–164. Springer, Heidelberg (1997)
Okamoto, T.: Efficient Blind and Partially Blind Signatures Without Random Oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80–99. Springer, Heidelberg (2006)
Okamoto, T.: Efficient blind and partially blind signatures without random oracles. Cryptology ePrint Archive, Report 2006/102 (2006), http://eprint.iacr.org/
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. of Cryptology 13, 361–396 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vasco, M.I.G., Heidarvand, S., Villar, J.L. (2012). Flexible Anonymous Subscription Schemes. In: Obaidat, M.S., Tsihrintzis, G.A., Filipe, J. (eds) e-Business and Telecommunications. ICETE 2010. Communications in Computer and Information Science, vol 222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25206-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-25206-8_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25205-1
Online ISBN: 978-3-642-25206-8
eBook Packages: Computer ScienceComputer Science (R0)