Provably secure E-cash system with practical and efficient complete tracing

被引:13
|
作者
Lian, Bin [1 ,2 ]
Chen, Gongliang [1 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200030, Peoples R China
[2] Zhejiang Univ, Ningbo Inst Technol, Ningbo, Zhejiang, Peoples R China
关键词
E-cash; Complete tracing; Practical tracing; Nested structure of signature of knowledge; Removable multi-TTP; DIVISIBLE E-CASH; COMPACT E-CASH; FAIR E-CASH; SIGNATURE SCHEMES; ZERO-KNOWLEDGE; DIRECTIONS; PROTOCOLS;
D O I
10.1007/s10207-014-0240-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-cash system can guarantee the anonymity of the user, but it also can be misused illegally. So the idea of fair E-cash was introduced, i.e., the anonymity of the user can be revoked when a crime is involved in fair E-cash system. However, it is still an unsolved problem to design a practical and efficient fair E-cash scheme, since there are some problems of the impracticality or the incompleteness in the tracing design of existing schemes. First we discuss the principal reasons of it. The reason of impractical tracing is that many schemes have respective unsolved problems in designing the practical tracing. We solve one kind of the problems, then present the practical tracings in various situations, including the bank's double-spending tracing without the trusted third party (TTP), the TTP's unconditional tracing and the bank's loss-coin tracing without TTP, which we call complete tracing. For some schemes, the reason of incomplete tracing is that the unsolved efficiency problems result in the incomplete design of tracing, whereas for other schemes, the reason of incomplete tracing is that the unconditional tracing and the anonymous spending are contradicting properties of E-cash. Considering that, the TTP can be divided into multiple parties, and the TTP is also removable in our system. Moreover, for solving the efficiency problem of practical tracing, we use a nested structure of signature of knowledge in payment protocol, which is proved to be a secure application. Then we provide the detailed security proofs of all security properties of our E-cash scheme and analyze our system efficiency and system functions comparing with the recent schemes.
引用
收藏
页码:271 / 289
页数:19
相关论文
共 50 条
  • [1] Provably secure E-cash system with practical and efficient complete tracing
    Bin Lian
    Gongliang Chen
    Jianhua Li
    [J]. International Journal of Information Security, 2014, 13 : 271 - 289
  • [2] Compact E-Cash with Practical and Complete Tracing
    Lian, Bin
    Chen, Gongliang
    Cui, Jialin
    He, Dake
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (07): : 3733 - 3755
  • [3] Complete Fair Tracing E-cash System with Provable Security
    Lian, Bin
    Chen, Gongliang
    Li, Jianhua
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 17 - 35
  • [4] Compact E-Cash with Efficient Coin-Tracing
    Lian, Bin
    Chen, Gongliang
    Cui, Jialin
    Ma, Maode
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 220 - 234
  • [5] Practical compact e-cash
    Au, Man Ho
    Susilo, Willy
    Mu, Yi
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 431 - +
  • [6] Efficient Arbitrarily Divisible E-Cash Applicable to Secure Massive Transactions
    Liu, Jianhua
    [J]. IEEE ACCESS, 2019, 7 : 59299 - 59310
  • [7] Divisible e-cash made practical
    Canard, Sebastien
    Pointcheval, David
    Sanders, Olivier
    Traore, Jacques
    [J]. IET INFORMATION SECURITY, 2016, 10 (06) : 332 - 347
  • [8] Divisible E-Cash Made Practical
    Canard, Sebastien
    Pointcheval, David
    Sanders, Olivier
    Traore, Jacques
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 77 - 100
  • [9] Conditional anonymous compact e-cash with auditable tracing
    Wang, Qian
    [J]. ICIC Express Letters, 2010, 4 (05): : 1671 - 1675
  • [10] Efficient E-cash with Attributes on MULTOS Smartcards
    Hinterwaelder, Gesine
    Riek, Felix
    Paar, Christof
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2015, 2015, 9440 : 141 - 155