Abstract
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. Payers are able to remunerate payees for services that depend on future, yet to be determined outcomes of events. Once payment complete, any double-spending attempt by the payer will reveal its identity; no double-spending by the payee is possible. Payers can not be linked to payees or to ongoing or past transactions. The flow of cash within the system is thus both correct and anonymous. We discuss several applications of conditional e-cash including online trading of financial securities, prediction markets, and betting systems.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-540-77366-5_37
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Intrade: A trade exchange network company, http://www.intrade.com/
Iowa electronic markets, http://www.biz.uiowa.edu/iem/
Iowa health prediction market, http://fluweb.biz.uiowa.edu/fluhome/index.html
Newsfutures, http://us.newsfutures.com/home/home.html
Strategy page, http://www.strategypage.com/prediction_market/default.asp
Tradesports, http://www.tradesports.com/
Arrow, K.J., Debreu, G.: The existence of an equilibrium for a competitive economy. Econometrica 22 (1954)
Balasko, Y.: Foundations of the Theory of General Equilibrium (1986)
Blake, I.F., Chan, A.C.F.: Scalable, server-passive, user-anonymous timed release cryptography. In: ICDCS 2005. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Washington, DC, USA, pp. 504–513. IEEE Computer Society, Los Alamitos (2005)
Camenisch, J., Maurer, U.M., Stadler, M.: Digital payment systems with passive anonymity-revoking trustees. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 33–43. Springer, Heidelberg (1996)
Cathalo, J., Libert, B., Quisquater, J.-J.: Efficient and non-interactive timed-release encryption. In: Qing, S., Mao, W., Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 291–303. Springer, Heidelberg (2005)
Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology— Proceedings of Crypto 1982, pp. 199–203. Plenum Press (1982)
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985)
Chaum, D.: Privacy protected payments: Unconditional payer and/or payee untraceability. In: Proceedings of SmartCard 2000 (1988)
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Davida, G.I., Frankel, Y., Tsiounis, Y., Yung, M.: Anonymity control in e-cash systems. In: FC 1997. LNCS, vol. 1318, pp. 1–16. Springer, Heidelberg (1997)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Dodis, Y., Yum, D.H.: Time capsule signature. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 57–71. Springer, Heidelberg (2005)
Frankel, Y., Tsiounis, Y., Yung, M.: ”indirect discourse proof”: Achieving efficient fair off-line e-cash. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 286–300. Springer, Heidelberg (1996)
Franklin, M.K., Yung, M.: Secure and efficient off-line digital money (extended abstract). In: Lingas, A., Carlsson, S., Karlsson, R. (eds.) ICALP 1993. LNCS, vol. 700, pp. 265–276. Springer, Heidelberg (1993)
Kiviat, B.: The end of management? Time - Inside Business, http://www.time.com/time/insidebiz/printout/0,8816,1101040712-660965,00.html
Stadler, M., Piveteau, J.-M, Camenisch, J.: Fair blind signatures. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 209–219. Springer, Heidelberg (1995)
Samuelson, P.A.: Foundations of Economic Analysis. Harvard University Press (1947)
Saporito, B.: Place your bets! Time, http://www.time.com/time/magazine/article/0,9171,1118373,00.html
Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley & Sons, Chichester (1996)
Simon, D.R.: Anonymous communication and anonymous cash. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 61–73. Springer, Heidelberg (1996)
Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In: Proc. 9th USENIX Security Symposium, pp. 59–72 (August 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, L., Carbunar, B., Sion, R. (2007). Conditional E-Cash. In: Dietrich, S., Dhamija, R. (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, vol 4886. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77366-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-77366-5_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77365-8
Online ISBN: 978-3-540-77366-5
eBook Packages: Computer ScienceComputer Science (R0)