Balancing Accountability and Privacy Using E-Cash (Extended Abstract)
نویسندگان
چکیده
In an electronic cash (e-cash) system, a user can withdraw coins from the bank, and then spend each coin anonymously and unlinkably. For some applications, it is desirable to set a limit on the dollar amounts of anonymous transactions. For example, governments require that large transactions be reported for tax purposes. In this work, we present the first e-cash system that makes this possible without a trusted party. In our system, a user’s anonymity is guaranteed so long as she does not: (1) double-spend a coin, or (2) exceed the publicly-known spending limit with any merchant. The spending limit may vary with the merchant. Violation of either condition can be detected, and can (optionally) lead to identification of the user and discovery of her other activities. While it is possible to balance accountability and privacy this way using e-cash, this is impossible to do using regular cash. Our scheme is based on our recent compact e-cash system. It is secure under the same complexity assumptions in the random-oracle model. We inherit its efficiency: 2 coins can be stored in O(`+ k) bits and the complexity of the withdrawal and spend protocols is O(` + k), where k is the security parameter.
منابع مشابه
Accountable Privacy
As the Internet has gained widespread use, and advanced technologies such as high-speed multi-media technologies and automated digital monitoring have become a reality, privacy is at the greatest risk of all time. At the same time, sophisticated threats from hackers, terrorists, thieves, and others that would abuse privacy highlight the need to nd technologies that provide some accountability. ...
متن کاملFine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract
Security and privacy concerns over the handling of electronic healthcare records have received significant attention over the past few years. In response to the increase need for sharing and maintenance of personal health records many recent publications attempt to address the thorny problem of controlling access to electronic health records (EHRs) and personal health records (PHRs). These effo...
متن کاملEfficient Cryptography for Information Privacy
of “Efficient Cryptography for Information Privacy” by Foteini Baldimtsi, Ph.D., Brown University, May 2014. In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic transactions provide efficiency and convenience, they usually overlook the privacy of the users...
متن کاملPersonal privacy and common goods: a framework for balancing under the national health information privacy rule.
Standards for Privacy of Individually Identifiable Health Information ("health data privacy regulations")' pursuant to a congressional mandate in the Health Insurance Portability and Accountability Act of 1996 (HIPAA). 2 These regulations, promulgated by the Department of Health and Human Services (DHHS), represent the first systematic national privacy protec-tions of health information. They p...
متن کاملProtecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks
structured abstract Research paper Purpose To enhance security and privacy of e-cash systems that apply revocable anonymity by presenting a stochastic attack, that reveals the hidden ID, and suitable protection means against this kind of attacks. Methodology/Approach The feasibility of a stochastic attack that reveals the ID of user of e-cash schemes with revocable anonymity is shown. To avoid ...
متن کامل