Presentation | 1998/11/20 Classification and Security of Off-line Electronic Money Systems Shingo MIYAZAKI, Kouichi SAKURAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In the previous off-line e-money systems, a numerous of crucial secret data such as the knowledge of key for issuing money and various information (ID, public key, etc.) related to users are centralized in a bank. So, in this paper, the security of the off-line e-money against the malicious bank is discussed. As the guide, we classify the known e-money systems based on the Chaum-Fiat-Naor paradigm into four types. Then, we propose two insider attacks of framing and issuing forged certification. In addition, the security of which systems depends on mutual verification among tamper-free divices or reliance of CA is discussed. From the above analysis, we consider the requirements of (ideally) secure e-money systems against various attacks discussed in this paper. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | off-line e-money / anonymity / double-spending / trusted third authorities / insider attack |
Paper # | ISEC98-45 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1998/11/20(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Classification and Security of Off-line Electronic Money Systems |
Sub Title (in English) | |
Keyword(1) | off-line e-money |
Keyword(2) | anonymity |
Keyword(3) | double-spending |
Keyword(4) | trusted third authorities |
Keyword(5) | insider attack |
1st Author's Name | Shingo MIYAZAKI |
1st Author's Affiliation | Department of Computer Science and Communication Engineering, Kyushu University() |
2nd Author's Name | Kouichi SAKURAI |
2nd Author's Affiliation | Department of Computer Science and Communication Engineering, Kyushu University |
Date | 1998/11/20 |
Paper # | ISEC98-45 |
Volume (vol) | vol.98 |
Number (no) | 426 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |