Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.

Slides:



Advertisements
Similar presentations
Copyright, 1996 © Dale Carnegie & Associates, Inc. BANK ON IT Money Smart Course Indiana Department of Financial Institutions.
Advertisements

Secure Multiparty Computations on Bitcoin
Digital Cash Mehdi Bazargan Fall 2004.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Computer Science Dr. Peng NingCSC 774 Advanced Network Security1 Topic 3.2: Micro Payments.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Presentation by Team 4.  What Is It?—Tim Johnson  How Does it Work—Javier Navarro  Different Kinds of Cryptocurrency—Idong  Challenges—Mark Weeks.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Checking Accounts & Banking Services
7. Asymmetric encryption-
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Announcements: 1. Presentations start Friday 2. Cem Kaner presenting O th block today. Questions? This week: DSA, Digital Cash DSA, Digital Cash.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
E-Money / Digital Cash Lin Huang. Money / Digital Cash What is Money –Coins, Bill – can’t exist on two places at one time –Bearer bonds: immediate cashable.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
MIS 3090 IT for Financial Services Digital Cash September 4, 2015.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Bitcoin (what, why and how?)
September 20 th, 2006 U-Prove crypto overview Copyright © 2006, Quebec Inc. Proprietary and Confidential.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
2/16/001 E-commerce Systems Electronic Payment Systems.
Anonymous Digital Cash  Ashok Reddy  Madhu Tera  Laxminarayan Muktinutalapati (Lux)  Venkat Nagireddy.
1. ◦ Intro ◦ Online shopping vs MOTO ◦ Credit card payments vs PayPal ◦ E-cash? 2.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Ian Miers, Christina Garman, Matthew Green, Avi Rubin Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
Anonymous Credentials
eCommerce Technology Lecture 13 Electronic Cash
Presentation transcript:

Electronic Cash R. Newman

Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity Metrics for Anonymity Applications of anonymity technology

Barter Cash Check Wire transfer Credit/debit card E-cash Payment forms

Barter Earliest form of payment Value intrinsic in the bartered good/service Physical presence of good/service Not flexible, not easily divisible Cash Check Wire transfer Credit/debit card E-cash Payment forms

Barter Cash Difficult to trace Hard to forge Physical presence of coins, notes May or may not have intrinsic value Check Wire transfer Credit/debit card E-cash Payment forms

Barter Cash Check Easy to trace, can be revoked Flexible amounts Slow – hard to verify immediately Can be mailed or used electronically Wire transfer Credit/debit card E-cash Payment forms

Barter Cash Check Wire transfer Easy to verify Fast Expensive Credit/debit card E-cash Payment forms

Barter Cash Check Wire transfer Credit/debit card Easy to verify quickly Less expensive than wire transfer Easy to trace, cards can be revoked Convenient for electronic use (remote payment) E-cash Payment forms

Credentials can be stolen Account number, name on card Address, zip code easy to find PIN revealed during use Smart cards Alleviate some of the issues above Still, can be traced – privacy is lost Electronic Payment Problems

Easy to use electronically Convenience Easy to verify Inexpensive Reliable Detect forgeries easily Easy for bank to generate, hard for others Hard to trace (for payer) Privacy Easy to determine if used twice (for bank) Electronic Cash Requirements

Form of currency: (x, f(x) 1/3 mod n) n is large composite whose factors known only to bank f is a one-way function Chaum Electronic Cash

1. Alice choses random x, r, sends Bank B = r 3 f(x) % n 2. Bank computes and returns cube root to Alice, r f(x) 1/3 % n withdraws a dollar from Alice’s account 3. Alice extracts C = f(x) 1/3 % n 4. To pay Bob one dollar, Alice give him (x, f(x) 1/3 % n) 5. Bob immediately verifies coin with bank ensures coin has not been spent already Chaum Electronic Cash

All can verify correct structure Bank cannot associate coin with Alice’s account But Bob must contact Bank immediately Newer protocol removes this requirement Allows bank to reveal Alice’s identity if coin spent twice Chaum Electronic Cash

Bank publishes an RSA modulus n such that phi(n) has no small odd factors, sets security parameter k k used for cut-and-choose verification Let f and g be two-arguement, collision-free functions – i.e., computationally infeasible to find two inputs that map to the same output Alice has bank account number u Bank associates counter v with account u Untraceable Coins

To get a coin: 1. Alice chooses a i, c i, d i, and r i independently and uniformly from residues modulo n, for 1 <= i <= k 2. Alice sends Bank blinded candidates: B i = r i 3 f(x i, y i ) % n where x i = g(a i, c i ) and y i = g(a i XOR (u || (v + i), d i ) 3. Bank chooses half of the candidates at random 4. Alice provides Bank with a i, c i, d i, and r i for the selected candidates (cut-and-choose) Untraceable Coins

To get a coin (con’t): 5. Bank verifies Alice was honest with those candiates, then sends Alice  B i 1/3 for the remaining candidates, charges account u a dollar, increments v by k 6. Alice extracts C =  f(x i, y i ) 1/3 % n Note: Bank catches Alice with high probability if she cheats with her blinded candidates Untraceable Coins

To use a coin 1. Alice sends C to Bob 2. Bob chooses k/2 random bits z i 3. If z i = 1, Alice sends Bob a i, c i, and y i else Alice sends Bob x i, a i XOR (u || (v + i), and d i 4. Bob verifies form of C and Alice’s responses fit 5. Bob later sends C and Alice’s responses to Bank 6. Bank verifies correctness of spent coin and credits Bob’s account, stores C, z i s, and responses Untraceable Coins

If Alice spends a coin twice, It is likely that for some i, z i XOR z i ’ = 1 Bank can search for C’s to see if coin was spent If C was used twice, it is likely that Bank has both a i and a i XOR (u || (v + i), for some i So Bank can determine u and catch Alice Untraceable Coins

If Alice colludes with a second vendor Charlie, After spending her coin with Bob, they can arrange for Charlie to use the same z i s as Bob Bank knows that one cheated, but not which one! And Bank can’t identify Alice! Remedy: Force each vendor to use distinct z i s for some portion of them, random z i s for the rest (sufficient number to allow for many purchases by Alice) Untraceable Coins

Bank can frame Alice! (how?) Hence, won’t hold up in court To prevent this, Alice uses public key signatures Computational security only Alice uses pseudonymous account for each coin Proving Multiple Spending

Alice chooses for each i random z i ’, z i ’’ u i is of the form [Alice’s acct number || z i ’ || z i ’’] Along with B i ’s, Alice gives Bank signature for g(z 1 ’, z 1 ’’) || g(z 2 ’, z 2 ’’) ||... || g(z k ’, z k ’’) During cut-and-choose, Bank verifies correctness of form of u i for each of the k/2 B i ’s it examines Bank has proof of multiple spending of a coin whenever it can present preimage of at least k/2+1 of the g(z i ’, z i ’’) Proving Multiple Spending

Untraceable checks – issued with maximum value Use coins of with power of 2 values to express arbitrary value as sum of powers of two Retrieve unspent coins from check Central Bank always an issue Solved with Byzantine agreement in Bitcoin Very different approach to valuation.... Other Results