Improved on Date Attachable Electronic Cash

Article Preview

Abstract:

Electronic cash (E-cash) is widely used due to the electronic commerce being in vogue. The date attached E-cash can apply for some services such as interest calculation, expired date processing, etc. In this paper, we propose two E-cash schemes with date attachable: the basic scheme with a better efficiency and the advanced scheme with an extensible date. The most remarkable contribution is that the advanced scheme can express any readable date with the relative year concept and still has a marvelous efficiency improvement as well as the basic scheme has.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3444-3448

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Abe, E. Fujisaki, K. Kim and T. Matsumoto, How to Date Blind Signatures, Proceedings of the 2nd International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology, Kyongju, Korea, 1996, pp.244-251.

DOI: 10.1007/bfb0034851

Google Scholar

[2] D. Chaum, D. Chaum, R. L. Rivest and A. T. Sherman, Blind Signatures for Untraceable Payments, Proceedings of Crypto '82: Advances in Cryptology, California, USA, 1982, pp.199-203.

DOI: 10.1007/978-1-4757-0602-4_18

Google Scholar

[3] D. Chaum, A. Fiat and M. Naor, Untraceable Electronic Cash, Proceedings of Crypto '88: Advances in Cryptology, California, USA, 1988, pp.319-327.

DOI: 10.1007/0-387-34799-2_25

Google Scholar

[4] C.-I. Fan and C.-L. Lei, Low-computation Partially Blind Signatures for Electronic Cash, IEICE Trans. Fundamentals E81-A(5) (1998) pp.818-824.

Google Scholar

[5] C.-I. Fan, W.-K. Chen and Y.-S. Yeh, Date attachable electronic cash, Comput. Commun 23(4) (2000) 425-428.

DOI: 10.1016/s0140-3664(99)00189-9

Google Scholar

[6] M.-S.Hwang, I.-C. Lin and L.-H. Li, A Simple Micro-payment Scheme, J. Syst. Software 55(3) (2001) 221-229.

Google Scholar

[7] M.-S. Hwang, C.-C. Lee and Y.-C. Lai, Traceability on Low-Computation Partially Blind Signatures for Electronic Cash, IEICE Trans. Fundamentals E85-A(5) (2002) 1181-1182.

Google Scholar

[8] M.-S. Hwang, C.-C. Lee and Y.-C. Lai, Traceability on RSA-Based Partially Signature with Low Computation, Appl. Math. Comput. 145(2) (2003) 465-468.

DOI: 10.1016/s0096-3003(02)00500-3

Google Scholar

[9] M.-S. Hwang, C.-C. Lee and Y.-C. Lai, Traceability on Stadler et al.'s Fair Blind Signature Scheme, IEICE Trans. Fundamentals E86-A(2) (2003) 513-514.

Google Scholar

[10] M.-S. Hwang, C.-C. Lee and Y.-C. Lai, An Untraceable Blind Signature Scheme, IEICE Trans. Fundamentals E86-A(7) (2003) 1902-1906.

Google Scholar

[11] S. Kim and H. Oh, Efficient Anonymous Cash Using the Hash Chain, IEICE T. Commun. E86-B(3) (2003) 1140-1143.

Google Scholar

[12] C.-C. Lee, M.-S. Hwang and W.-P. Yang, Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem, Fund. Inform. 55(3-4) (2003) 307-320.

Google Scholar

[13] C.-C. Lee, M.-S. Hwang and W.-P. Yang, A New Blind Signature Based on the Discrete Logarithm Problem for Untraceability, Appl. Math. Comput. 164(3) (2005) 837-841.

DOI: 10.1016/j.amc.2004.06.034

Google Scholar

[14] J. Li and S, Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key, International Journal of Network Security 4(2) (2007) 193-200.

Google Scholar

[15] J.-W Lo, M.-S Hwang and Y.-P Chu, An Exchangeable E-Cash Scheme by E-mint, the proceedings of the 8th International Conference on Intelligent Systems Design and Applications 3(2008) 246-251.

DOI: 10.1109/isda.2008.186

Google Scholar

[16] N. A. Moldovyan and A. A. Moldovyan, Blind Collective Signature Protocol Based on Discrete Logarithm Problem, International Journal of Network Security 11(2010) 44-48.

DOI: 10.31799/1684-8853-2020-3-71-78

Google Scholar

[17] N. A. Moldovyan, Blind Signature Protocols from Digital Signature Standards, International Journal of Network Security 13(1) (2011) 202-205.

Google Scholar

[18] G. K. Verma, Probable Security Proof of a Blind Signature Scheme over Braid Groups, International Journal of Network Security 12(2) (2009) 118-124.

Google Scholar