Abstract
In a variant of the electronic cash protocol, an electronic coupon protocol, a withdrawn coin is divided into many sub-coins whose face values are fixed in advance, and the sub-coins are only used in payments. The original coin is called ticket and the sub-coins are called sub-tickets. The electronic cash protocol should satisfy not only the anonymity that the payer cannot be traced from the payments, but also the unlinkability. The unlinkability means that anyone cannot determine whether payments were made by the same payer. If the unlinkability does not hold, tracing the payer from one payment leads to tracing the payer from all his/her payments, and the link between the payments also facilitates the de-anonymization. In the previously proposed electronic coupon protocol, payments of sub-tickets derived from the same ticket are linkable. Since the complete anonymity of payments facilitates fraud and criminal acts, the electronic cash protocols should equip the revocation of the anonymity. In this paper, an electronic coupon protocol is proposed, where all payments are unlinkable but the anonymity of the payments can be revoked.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pfitzmann, B. and Waidner, M.: How to Break and Repair a “Provably Secure” Untraceable Payment System, Advances in Cryptology — CRYPTO’91, LNCS 576, Springer-Verlag, pp. 338–350 (1992).
Okamoto, T. and Ohta, K.: One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, No. 1, pp. 2–10 (1998).
Camenisch, J. and Stadler, M.: Efficient Group Signature Schemes for Large Groups, Advances in Cryptology — CRYPTO’97, LNCS 1294, Springer-Verlag, pp. 410–424 (1997).
von Solms, S. and Naccache, D.: On Blind Signatures and Perfect Crimes, Computers and Security, Vol. 11, No. 6, pp. 581–583 (1992).
Davida, G., Frankel, Y., Tsiounis, Y. and Yung, M.: Anonymity Control in E-Cash Systems, In the 1st Financial Cryptography Conference (1997). Available at http://www.ccs.neu.edu/home/yiannis/pubs.html.
Schnorr, C. P.: Efficient signature generation for smart cards, Advances in cryptology — CRYPTO’89, LNCS 435, Springer-Verlag, pp. 239–252 (1990).
Stadler, M.: Publicly Verifiable Secret Sharing, Advances in Cryptology — EUROCRYPT’96, LNCS 1070, Springer-Verlag, pp. 190–199 (1996).
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms, Advances in Cryptology — CRYPTO’84, LNCS 196, Springer-Verlag, pp. 10–18 (1985).
Chaum, D.: Blind Signatures for Untraceable Payments, Advances in Cryptology: Proceedings of CRYPTO’ 82, Plenum Press, pp. 199–203 (1983).
Chan, A., Frankel, Y. and Tsiounis, Y.: Easy Come-Easy Go Divisible Cash, Advances in Cryptology — EUROCRYPTO’98, LNCS 1403, Springer-Verlag, pp. 561–575 (1998).
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nakanishi, T., Haruna, N., Sugiyama, Y. (1999). Unlinkable Electronic Coupon Protocol with Anonymity Control. In: Information Security. ISW 1999. Lecture Notes in Computer Science, vol 1729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47790-X_4
Download citation
DOI: https://doi.org/10.1007/3-540-47790-X_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66695-0
Online ISBN: 978-3-540-47790-7
eBook Packages: Springer Book Archive