Two New Electronic Cash Schemes Based on Elliptic Curve

Article Preview

Abstract:

Two secure, high-efficient and feasible e-cash schemes are proposed in this thesis based on elliptic curve by using blind signature system, the schemes are completed by three protocols, namely, withdrawal protocol, payment protocol and deposit protocol. The two schemes make advantage of blind parameter, namely, after cash is received by Bank, cash is also hardly connected with the signature at some times. They are simple and easily realized. The elliptic curve cryptographic algorithm is adopted in the scheme, the length of the private key is short, and its efficiency and strength is significantly higher than e-cash scheme based on RSA signature proposed by D.Chaum. There is no effective solution to the elliptic curve discrete logarithm problem (ECDLP), therefore, the schemes are safe.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 694-697)

Pages:

2388-2393

Citation:

Online since:

May 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Runtong Zhang. Electronic Commerce Introduction, Publishing House of Electronics Industry, Beijing (2003). In Chinese

Google Scholar

[2] Chaum D. Blind Signature for Untraceable Payments[A] . Advances in Cryptology - CRYPTO'82 Proceedings [C] . Plenum Press, 1983. 199 - 203.

DOI: 10.1007/978-1-4757-0602-4_18

Google Scholar

[3] Ming Zhong, Yi xian Yang. Journal of Beijing University of Posts and Telecommunications, (3) (2000) , pp.87-90. In Chinese

Google Scholar

[4] Zhao Xu, Yixian Yang. Journal of Beijing University of Posts and Telecommunications, 25 (4) (2002),pp.70-73. In Chinese

Google Scholar

[5] Li Chen, Bian Zhu. Application Research of Computer, 27 (12) (2010), pp.4659-4661. In Chinese

Google Scholar

[6] Ziba Eslami, ehdi Talebi. Electronic Commerce Research and Applications, 10(201l), pp.59-66

Google Scholar

[7] Yuan Tian,Xiaojun Wen, Yanju Gong. Computer Engineering and Applications, 47(2011), p.108-l12.

Google Scholar

[8] SimplotRyl, Traore, Everaere. International Journal of Parallel, Emergent and Distributed Systems, 24(2009), pp.243-271

Google Scholar

[9] Xiaoming Hu, Shangteng Huang. The Journal of Systems and Software, 2009, p.1051—1054

Google Scholar

[10] Yongxiang Bai, Minning Li. Journal of Shaanxi University of Technology (Natural Science Edition), 25(2009), pp.53-57

Google Scholar

[11] Xianyong Meng. Computer Technology and Development, 20(12) (2010), pp.221-225. In Chinese

Google Scholar