TY - GEN
T1 - Traceable decentralized anonymous E-cash system against active attackers
AU - Feng, Hanwen
AU - Liu, Jianwei
AU - Wu, Qianhong
AU - Xu, Tongge
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/8
Y1 - 2019/8
N2 - Decentralized e-cash schemes such as Bitcoin have seen widespread adoption due to the elimination of dependence on trusted authorities. However, the decentralization property also brings difficulties on privacy preserving and auditing. Although several approaches have been suggested to support anonymity, none of them has a reliable anonymity revocation mechanism. We fill this gap by presenting a novel e-cash scheme called traceable decentralized anonymous e-cash (TDAE). In TDAE, the transactions can be publicly verified, and the identities of the payers and payees are hidden from everyone except a designated authority. Moreover, we consider active attackers who can corrupt selected authorities along with many users within the e-cash system. We present rigorous security definitions for a TDAE scheme, ensuring that even an active attacker cannot spend more money than he owns, neither can he frame any user that is not corrupted. We also provide a secure generic construction of a TDAE scheme. This construction is built upon several basic cryptographic tools, and thus it enables one to obtain a TDAE with better security and efficiency when advantageous tools are available.
AB - Decentralized e-cash schemes such as Bitcoin have seen widespread adoption due to the elimination of dependence on trusted authorities. However, the decentralization property also brings difficulties on privacy preserving and auditing. Although several approaches have been suggested to support anonymity, none of them has a reliable anonymity revocation mechanism. We fill this gap by presenting a novel e-cash scheme called traceable decentralized anonymous e-cash (TDAE). In TDAE, the transactions can be publicly verified, and the identities of the payers and payees are hidden from everyone except a designated authority. Moreover, we consider active attackers who can corrupt selected authorities along with many users within the e-cash system. We present rigorous security definitions for a TDAE scheme, ensuring that even an active attacker cannot spend more money than he owns, neither can he frame any user that is not corrupted. We also provide a secure generic construction of a TDAE scheme. This construction is built upon several basic cryptographic tools, and thus it enables one to obtain a TDAE with better security and efficiency when advantageous tools are available.
KW - Anonymity revocation
KW - Decentralized e-cash
KW - Privacy protection
UR - https://www.scopus.com/pages/publications/85075129141
U2 - 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00070
DO - 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00070
M3 - 会议稿件
AN - SCOPUS:85075129141
T3 - Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019
SP - 344
EP - 349
BT - Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 17th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019
Y2 - 5 August 2019 through 8 August 2019
ER -