Blind Certification of Public Keys and Efficiently Revocable Cash: Secure Against Capable Attackers

نویسنده

  • Wenbo Mao
چکیده

Electronic cash should be revocable in order to nullify the effect of attacks mounted by a capable attacker (e.g., double spending by reverse-engineering tamper-resistant devices). For prudent engineering considerations, cash revocability forms a necessary complementary measure to using tamper-resistant devices, adding system security while lowering system cost by reducing the level of physical tamper resistance required. We propose a revocable cash scheme. Cash revocation is achieved efficiently via withdrawing an attacker's ability to further use the system. In several ways the new scheme improves from previous ones (including trustee-based tracing techniques, e.g., [5, 14, 19]), that identify the attacker and revoke cash in terms of publishing a blacklist of coins misused or robbered. Firstly, the new scheme can stop the attacker from further using the system without need of physical confiscation of him/her or his/her devices (physical confiscation is difficult over the network). Secondly, it will achieve a better performance due to avoiding real-time checking through a potentially big coin revocation list. Thirdly, without using trustee, the system serves unconditional privacy for honest users and uses simpler protocols for transactions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Blind Certification of Public Keys and Off-line Electronic Cash

We present a method for blind certifying end-users' public keys and its application in offline electronic cash. A blind certificate of a public key is similar to an ordinary public-key certificate, however the identity of the certificate holder is concealed under the key certified. A digital signature supported by a blind certificate can be verified without identifying the signer. The technique...

متن کامل

ID-Based Distributed "Magic Ink" Signature from Pairings

The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbitrary number, thus at the same time he can prove his identity rather than providing a certificate from CA. Now a revocable blind signature is becoming more practical; because a complete anonymity can be abused in real w...

متن کامل

An Efficient Off-line Electronic Cash System with Revocable Anonymity

Numerous anonymity revocation mechanisms have been proposed for off-line e-cash system in the last decade. Within this category of payment systems, two primary considerations are double-spending detection and tracing capability. However, most designs and existing solutions for these two basic requirements are inefficient or impractical. In this paper, an efficient e-cash with anonymity revocati...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996