Abstract
By introducing a new e-commerce paradigm - that of disposable anonymous accounts-we are able to reduce storage requirements, while protecting against strong attacks on the system, and keeping computational requirements low. Our proposed scheme reduces storage costs of payers and merchants to the lowest theoretically possible, offers users computational (but not revocable) privacy, and protects against the bank robbery attack. Furthermore, by being practically implementable as a smart card payment scheme, it avoids the threats of viral attacks on users. The scheme allows the notion of “pre-paid” cards by not requiring a link to the identity of the card owner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner, “iKP-A Family of Secure Electronic Payment Protocols,’ Proceedings of the First USENIX Workshop on Electronic Commerce, New York, July 1995, pp. 89–106.
S. Brands, “Untraceable Off-line Cash in Wallets with Observers,”Advances in Cryptology-Proceedings of Crypto’ 93, pp. 302–318.
S. Brands, “An Efficient Off-line Electronic Cash Systems Based on the Representation Problem,” C.W.I. Technical Report CS-T9323, The Netherlands
E. Brickell, P. Gemmell and D. Kravitz, “Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change,” Proc. 6th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1995, pp. 457–466.
J. Camenisch, U. Maurer and M. Stadler, “Digital Payment Systems with Passive Anonymity-Revoking Trustees,” Computer Security-ESORICS 96, volume 1146, pp. 33–43.
J. Camenisch, J-M. Piveteau and M. Stadler, “An Efficient Fair Payment System,” Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996, pp. 88–94.
D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology-Proceedings of Crypto’ 82, 1983, pp. 199–203.
D. Chaum, A. Fiat and M. Naor, “Untraceable Electronic Cash,” Advances in Cryptology-Proceedings of Crypto’ 88, pp. 319–327.
G.I. Davida, Y. Frankel, Y. Tsiounis, and M. Yung, “Anonymity Control in ECash Systems,” Financial Cryptography 97.
N. Ferguson, “Extensions of Single-term Coins,” Advances in Cryptology-Proceedings of Crypto’ 93, pp. 292–301.
Y. Frankel, Y. Tsiounis, and M. Yung, “Indirect Discourse Proofs: Achieving Efficient Fair Off-Line E-Cash,” Advances in Cryptology-Proceedings of Asiacrypt 96, pp. 286–300.
M. Franklin and M. Yung, “Blind Weak Signatures and its Applications: Putting Non-Cryptographic Secure Computation to Work,” Advances in Cryptology-Proceedings of Eurocrypt’ 94, pp. 67–76.
E. Fujisaki, T. Okamoto, “Practical Escrow Cash System”, LNCS 1189, Proceedings of 1996 Cambridge Workshop on Security Protocols, Springer, pp. 33–48.
M. Jakobsson, “Ripping Coins for a Fair Exchange,” Advances in Cryptology-Proceedings of Eurocrypt’ 95, pp. 220–230.
M. Jakobsson, A. Juels, “X-Cash: Executable Digital Cash,” Financial Cryptography’ 98.
M. Jakobsson, D. M’Raihi, “Mix-Based Electronic Payments,” SAC’ 98.
M. Jakobsson and M. Yung, “Revokable and Versatile Electronic Money,” 3rd ACM Conference on Computer and Communications Security, 1996, pp. 76–87.
M. Jakobsson and M. Yung, “Distributed ‘Magic Ink’ Signatures,” Advances in Cryptology-Proceedings of Eurocrypt’ 97, pp. 450–464.
M. Jakobsson and M. Yung, “Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System,” Advances in Cryptology-Proceedings of Financial Cryptography’ 97.
S. Jarecki and A. Odlyzko, “An efficient micropayment system based on probabilistic polling,” Advances in Cryptology-Proceedings of Financial Cryptography’ 97.
C. Jutla and M. Yung, “Paytree: ‘amortized signature’ for flexible micropayments,” 2nd USENIX Workshop on Electronic Commerce, November 1996.
S. H. Low, N. F. Maxemchuk and S. Paul, “Anonymous Credit Cards,” Proceedings of the Second ACM Conference on Computer and Communications Security, Nov. 1994, pp. 108–117.
G. Medvinsky and B. C. Neuman, “Netcash: A design for practical electronic currency on the internet,” Proceedings of the First ACM Conference on Computer and Communications Security, Nov. 1993, pp. 102–106.
D. M’Raïhi, “Cost-Effective Payment Schemes with Privacy Regulation,” Advances in Cryptology-Proceedings of Asiacrypt’ 96.
B. C. Neuman and G. Medvinsky, “Requirements for Network Payment: The NetChequeTM Perspective,” Compcon’ 95, pp. 32–36.
T. Okamoto, “An Efficient Divisible Electronic Cash Scheme,” Advances in Cryptology-Proceedings of Crypto’ 95, pp. 438–451.
T. Okamoto and K. Ohta, “Disposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash,” Advances in Cryptology-Proceedings of Crypto’ 89, pp. 481–496.
T. Okamoto and K. Ohta, “Universal Electronic Cash,” Advances in Cryptology-Proceedings of Crypto’ 91, pp. 324–337.
R. Rivest and A. Shamir, “PayWord and MicroMint: two simple micropayment schemes,” Cryptobytes, vol. 2, num. 1, 1996, pp. 7–11.
D. Simon, “Anonymous Communication and Anonymous Cash,” Crypto’ 96, pp. 61–73.
M. Sirbu and J. D. Tygar, “NetBill: An Internet Commerce System Optimized for Network Delivered Services,” Compcon’ 95, pp. 20–25.
S. von Solms and D. Naccache, “On Blind Signatures and Perfect Crimes,” Computers and Security, 11 (1992) pp. 581–583.
C. P. Schnorr, “Efficient Signature Generation for Smart Cards,” Advances in Cryptology-Proceedings of Crypto’ 89, pp. 239–252.
M. Stadler, J-M. Piveteau and J. Camenisch, “Fair Blind Signatures,” Advances in Cryptology-Proceedings of Eurocrypt’ 95, pp. 209–219.
J. Stern and S. Vaudenay, “SVP: a Flexible Micropayment Scheme,” Advances in Cryptology-Proceedings of Financial Cryptography’ 97.
J. M. Tenenbaum, C. Medich, A. M. Schiffman, and W. T.Wong, “CommerceNet: Spontaneous Electronic Commerce on the Internet,” Compcon’ 95, pp. 38–43.
B. Witter, “The Dark Side of Digital Cash,” Legal Times, January 30, 1995.
Y. Yacobi, “Efficient Electronic Money,” Advances of Cryptology-Proceedings of Asiacrypt’ 94, pp. 153–164.
Y. Yacobi, “On the continuum between on-line and off-line e-cash systems-I,” Advances in Cryptology-Proceedings of Financial Cryptography’ 97.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jakobsson, M. (1999). Mini-Cash: A Minimalistic Approach to E-Commerce. In: Public Key Cryptography. PKC 1999. Lecture Notes in Computer Science, vol 1560. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49162-7_10
Download citation
DOI: https://doi.org/10.1007/3-540-49162-7_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65644-9
Online ISBN: 978-3-540-49162-0
eBook Packages: Springer Book Archive