2014
DOI: 10.1007/s00500-014-1442-2
|View full text |Cite
|
Sign up to set email alerts
|

Protocol for irreversible off-line transactions in anonymous electronic currency exchange

Abstract: This paper presents an improvement to the wellknown protocol by David Chaum for anonymous currency exchange. We show its vulnerability to serious frauds by both the client and the seller, after an electronic coin is spent at least twice. In this case, the system cannot successfully determine how many times the client spent the coin and how many times the seller faked the transaction. Therefore, the bank is not able to charge the real abuser. This limitation leads to the conclusion that the original system cann… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Algorithms of false and multi-secret steganography presented in this paper may be also applied with connection to the visual secret sharing protocols Ogiela 2010, 2012;Yuan 2014). Obtained secret parts of visual information may be hidden over the communication channel and used for monitoring or authorization procedures in many different application, e.g., electronic currency exchange (Ogiela and Sulkowski 2014), medical images watermarking (Hachaj andOgiela 2012, 2013;Ogiela and Ogiela 2011) or even preventing information leakage in large computer infrastructures used for homeland security purposes .…”
Section: Discussionmentioning
confidence: 99%
“…Algorithms of false and multi-secret steganography presented in this paper may be also applied with connection to the visual secret sharing protocols Ogiela 2010, 2012;Yuan 2014). Obtained secret parts of visual information may be hidden over the communication channel and used for monitoring or authorization procedures in many different application, e.g., electronic currency exchange (Ogiela and Sulkowski 2014), medical images watermarking (Hachaj andOgiela 2012, 2013;Ogiela and Ogiela 2011) or even preventing information leakage in large computer infrastructures used for homeland security purposes .…”
Section: Discussionmentioning
confidence: 99%
“…Strategic data may comprise economic figures, i.e., the financials of the company, organization action strategy, intelligence data, design or logistical information [22].…”
Section: Example Of Managing Secret Shared Strategic Data In Cogmentioning
confidence: 99%
“…For secure communication when transmitting personal information, pattern information or information access keys, it was designed to be encrypted in two or three layers in the form of cipher-chaining. This also ensured that secret keys were used in the form of chaining or a secret sharing method was used, instead of processing the information using a shared secret key [19,20]. Lastly, when information is accessed, whether the user is a legitimate user is constantly verified.…”
Section: The Process Of Accessing Pattern Informationmentioning
confidence: 99%