INFORMATION SECURITY

Some general traits of the e-cash system and a review of a compact e-cash scheme with practical and complete tracing

  • 1 Faculty of Computer Science and Engineering, University "Ss Cyril and Methodius" - Skopje, R. of Macedonia

Abstract

The e-cash methodology has its advantages compared to other payment systems and it has brought big changes to the way business is being conducted. Money becomes an intangible item and travels electronically across the world in a widely open network that might expose it to risks. This means that secure end-to-end connections are needed and many different cryptographic algorithms are used to achieve it. In this paper we will go through the main metrics that characterize them and the main properties of the e-cash system. Finally, a review of a compact e-cash scheme with practical and complete tracing will be given.

Keywords

References

  1. R. Razali, The overview of E-cash: Implementation and security issues (GSEC, 2002)
  2. M. N. A. Wahid, A. Ali, B. Esparham, M. Marwan, Journal Comp. Scien. App. and Inf. Tech., A comparison of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish for guessing attacks prevention 1-7 (2018)
  3. https://spanning.com/blog/cia-triad-best-practices-securing-yourorg/
  4. P. Aigbe, J. Akpojaro, Intern. Jour. of comp. app., Analysis of security issues in electronic payment systems (2014)
  5. W. J. Tsaur, J. H. Tsao, Y. H. Tsao, An Efficient and Secure ECC-based Partially Blind Signature Scheme with Multiple Banks Issuing E-cash Payment Applications, Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (WorldComp, 2018)
  6. A. P. U. Siahaan, Elviwani, B. Oktaviana, Comparative analysis of rsa and elgamal cryptographic public-key algorithms (2018)
  7. https://en.wikipedia.org/wiki/Non-repudiation
  8. B. Lian, G. Chen, J. Cui, D. He, Compact E-Cash with Practical and Complete Tracing, KSII Transactions on Internet & Information Systems (2019)
  9. R. S. Anand, C. E. Veni Madhavan, An online, transferable ecash payment system, International Conference on Cryptology in India (Springer, Berlin, Heidelberg, 2000)
  10. https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/MicropaymentsAndTheNet/history.html
  11. B. Lian, G. Chen, J. Cui, M. Ma, Compact E-Cash with Efficient Coin-Tracing, IEEE Transactions on Dependable and Secure Computing (2018)
  12. J. Camenisch, A. Lysyanskaya, A signature scheme with efficient protocols, International Conference on Security in Communication Networks (Springer, Berlin, Heidelberg, 2002)
  13. J. P. Buhler, ed. Algorithmic Number Theory: Third International Symposium, ANTS-III, Portland, Orgeon, USA, June 21-25, 1998, Proceedings. Vol. 1423. (Springer Science & Business Media, 1998)
  14. M. Chase, A. Lysyanskaya, On signatures of knowledge, Annual International Cryptology Conference (Springer, Berlin, Heidelberg, 2006)
  15. M. Blum, P. Feldman, S. Micali, Non-interactive zeroknowledge and its applications, Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali 329-349 (2019)
  16. https://www.cs.jhu.edu/~susan/600.641/scribes/lecture10.pdf
  17. https://link.springer.com/referenceworkentry/10.1007%2F0-387-23483-7_329
  18. A. Asgaonkar, B. Krishnamachari, Solving the buyer and seller’s dilemma: A dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (IEEE, 2019)
  19. J. K. Liu, P. P. Tsang, D. S. Wong, Recoverable and untraceable e-cash, European Public Key Infrastructure Workshop (Springer, Berlin, Heidelberg, 2005)
  20. G. Davida, J. Frankel, Y. Tsiounis, M. Yung, Anonymity control in e-cash systems, International Conference on Financial Cryptography (Springer, Berlin, Heidelberg, 1997)
  21. M. H. Au, Q. Vu, W. Susilo, Y. Mi, Compact e-cash from bounded accumulator, Cryptographers’ Track at the RSA Conference (Springer, Berlin, Heidelberg, 2007)

Article full text

Download PDF