Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

Secure Multiparty Computations on Bitcoin
Digital Cash Mehdi Bazargan Fall 2004.
1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University URL: May,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Class 12 Anonymous Digital Currency CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Presentation by Team 4.  What Is It?—Tim Johnson  How Does it Work—Javier Navarro  Different Kinds of Cryptocurrency—Idong  Challenges—Mark Weeks.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Announcements: 1. Presentations start Friday 2. Cem Kaner presenting O th block today. Questions? This week: DSA, Digital Cash DSA, Digital Cash.
Your Presenter Amer Sharaf Electronic Payments: Where do we go from here? ByMarkus Jakobsson David Mraihi Yiannis Tsiounis Moti Yung.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
Read to Learn Discuss the functions and characteristics of money. Discuss three main functions of a bank.
Announcements: 1. Presentations start next Thursday Questions? This week and Monday: DSA, Digital Cash DSA, Digital Cash DTTF/NB479: DszquphsbqizDay 32.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Digital Payment Systems
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
E-Money / Digital Cash Lin Huang. Money / Digital Cash What is Money –Coins, Bill – can’t exist on two places at one time –Bearer bonds: immediate cashable.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
3. 18 Methods of making and receiving payments Methods of making and receiving payments Banks and bank accounts  All businesses have bank accounts.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Banking and Finance Business and Computer Science Mr. Dukes.
Electronic Payment Systems
MIS 3090 IT for Financial Services Digital Cash September 4, 2015.
Bitcoin (what, why and how?)
Lecture 8 e-money. Today Secure Electronic Transaction (SET) CyberCash On line payment system using e-money ECash NetCash MilliCent CyberCoin.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Micropayments Revisited Background for Peppercoin scheme By Willer Travassos.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Electronic Cash. Digicash: Ecash u “With ecash you can pay for access to a database, buy software ora newsletter by ,play a computer game over the.
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
Chapter 9 Checking Accounts.
2/16/001 E-commerce Systems Electronic Payment Systems.
Anonymous Digital Cash  Ashok Reddy  Madhu Tera  Laxminarayan Muktinutalapati (Lux)  Venkat Nagireddy.
Peppercoin Micropayments Ronald L. Rivest MIT CSAIL (joint work with Prof. Silvio Micali)
1. ◦ Intro ◦ Online shopping vs MOTO ◦ Credit card payments vs PayPal ◦ E-cash? 2.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
A Secure Online Card Payment Protocol VIJAY CHOUDHARY M.Tech(IS), DTU.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
E-commerce Payment Technology. 2 EC  E-commerce Payment Technology List     End E-moneyE-payment SystemInternet and the Banking Industry Main content.
Read to Learn Discuss the functions and characteristics of money. Discuss three main functions of a bank.
Efficient Anonymous Cash Using the Hash Chain Member:劉岱穎,吳展奇,林智揚
E-Payment Transactions SET, Pay-Pal, Digital Cash
ELECTRONIC PAYMENT SYSTEM.
Click here to advance to the next slide.
eCommerce Technology Lecture 13 Electronic Cash
Cryptocurrency and Blockchain Technology
Presentation transcript:

Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong

Outline Introduction of E-cash Introduction of E-cash Our Proposed Recoverable and Untraceable E-Cash Our Proposed Recoverable and Untraceable E-Cash –Concept –Construction Extension Extension Conclusion Conclusion

Electronic Cash Digital Analogy of paper cash According to [1], ideal e-cash has 6 main properties: Independence Security Privacy Off-line payment Transferability Divisibility [1] Tatsuaki Okamoto and Kazuo Ohta. “Universal electronic cash”. In J. Feigenbaum, editor, Advances in Cryptology – CRYPTO ’91, Lecture Notes in Computer Science, pages Springer-Verlag, 1992.

Electronic Cash Advantages of Electronic Cash over other kinds of payment systems: Privacy Off-line payment Suitable for Small Amount Payment Examples of Electronic Cash System: Mondex Octopus Card

A New Recoverable and Untraceable Electronic Cash Recoverability and untraceability are two conflicting properties! Most of the e-cash papers only focus on the 6 main properties. We propose a new scheme that can support recoverability and untraceability.

A New Recoverable and Untraceable Electronic Cash The Basic Idea – we use an indirect method: How much e-cash lost = How much e-cash withdraw – how much e-cash spent If we give up untraceability, it is easy! In our system, we append an additional number to each e-coin. This number gives no information about the identity of the user.

A New Recoverable and Untraceable Electronic Cash Our system is motivated from S. Brand ’ s Single Term E-Cash [2] protocol. Brief introduction of his protocol: Setup of the System Bank B, Customer U and Shop S. [2] S. Brands. Untraceable off-line cash in wallet with observers. In Advances in Cryptology – CRYPTO ’93, Lecture Notes in Computer Science, pages Springer-Verlag, 1993.

A New Recoverable and Untraceable Electronic Cash The Withdrawal Protocol After withdrawing e-cash from the bank, U obtains {A, B, sign(A, B)} as the coin. The Payment Protocol S sends a challenge to U. U computes the responses {r 1, r 2 } and sends them back to U together with the coin {A, B, sign(A, B)}. S checks the responses and the coins. Accept it if both are valid.

A New Recoverable and Untraceable Electronic Cash The Deposit Protocol S sends the coin {A, B, sign(A, B)},the responses {r 1, r 2 } and the date/time of the transactions to the B after some time. B checks whether this coin has been deposited before. If not, accept it. Otherwise, B uses the information provided by S to find out the identity of the double- spent user.

A New Recoverable and Untraceable Electronic Cash The Proposed Protocol: The Withdrawal Protocol There are 4 parties: Bank, Customer Alice, Shop and the Trusted Third Party (TTP). After withdraws coins from the bank, Alice goes to the TTP to get an additional number, x i, for 1 <= i <= n, for each coin. This additional number has the following properties: H(x 1 ) = H(x 2 ) = H(x 3 ) ….. = H(x n ) = y

A New Recoverable and Untraceable Electronic Cash The TTP maintains a list that records down all the serial number of the coins. If the coin is in the list, terminate the process. The TTP checks the signature on the coin. If valid, it gives another signature, such that S c = Sign TTP { A, B, Sign(A, B), x i } Now the coin contains the following: { A, B, Sign(A, B), x i, S c }

A New Recoverable and Untraceable Electronic Cash The TTP gives another signature on y and n. Let S b = Sign TTP { y, n }. S b will be given to Alice. Alice should keep {S b, y, n} in a safe place. The Payment Protocol The basic payment protocol based on S. Brand’s protocol. The shop checks also the signature of the TTP. The shop hashes the x i of the coin to produce its hash value and checks whether the coin is in the blacklist.

A New Recoverable and Untraceable Electronic Cash The Deposit Protocol The basic deposit protocol based on S. Brand’s protocol. The bank hashes the x i of the coin to produce its hash value and checks whether the coin is in the blacklist. The Recovery Protocol If Alice has lost her remaining coins, she has to do the following:

A New Recoverable and Untraceable Electronic Cash She has to reveal her identity to the bank and present the back-up number { S b, y, n } to the bank. The bank checks the signature of S b on {y, n}. It looks up its database to find out all the coins with their hashed values of x i are equal to y. These coins are those Alice has already spent. Finally the bank can calculate the difference D between the total amount Alice has withdrawn and the total amount she has spent.

A New Recoverable and Untraceable Electronic Cash In order to prevent Alice pretend losing the coins but in fact she does not, the following steps must be taken immediately: The bank adds the number y to the blacklist and broadcast it to all the shops. The shop adds this y to the blacklist.

A New Recoverable and Untraceable Electronic Cash Security Analysis Conditional Untraceability If Alice does not re-claim her lost e-coin, her anonymity is preserved. (Untraceable) If Alice re-claims her lost e-coin, she has to give up her anonymity.

A New Recoverable and Untraceable Electronic Cash Extension Customers can choose whether to “buy” the recoverable service or not. Pre-calculate the hash value: the TTP can produce many groups of x i, j such that H(x 1,j ) = H(x 2,j ) = H(x 3,j ) ….. = H(x n,j ) = y j

Conclusion We propose a new e-cash system with Recoverability and Untraceability We propose a new e-cash system with Recoverability and Untraceability We believe it can provide more convenience to users We believe it can provide more convenience to users Make e-cash more popular Make e-cash more popular