Anonymous Digital Cash  Ashok Reddy  Madhu Tera  Laxminarayan Muktinutalapati (Lux)  Venkat Nagireddy.

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

1 Chapter 24 Money and the Federal Reserve System Key Concepts Key Concepts Summary Summary Practice Quiz Internet Exercises Internet Exercises ©2002 South-Western.
Digital Cash Mehdi Bazargan Fall 2004.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
A Pairing-Based Blind Signature
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Presentation by Team 4.  What Is It?—Tim Johnson  How Does it Work—Javier Navarro  Different Kinds of Cryptocurrency—Idong  Challenges—Mark Weeks.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Attacks on Digital Signature Algorithm: RSA
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Electronic Check Payment Protocols and Systems
Announcements: 1. Presentations start Friday 2. Cem Kaner presenting O th block today. Questions? This week: DSA, Digital Cash DSA, Digital Cash.
Your Presenter Amer Sharaf Electronic Payments: Where do we go from here? ByMarkus Jakobsson David Mraihi Yiannis Tsiounis Moti Yung.
1 Blind Signatures 盲簽章 Chun-I Fan 范俊逸 E-Commerce & Security Engineering Lab. Department of Computer Science and Engineering National Sun Yat-Sen University.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
“Electronic Payment System”
Electronic Payment Systems. Transaction reconciliation –Cash or check.
E-Money / Digital Cash Lin Huang. Money / Digital Cash What is Money –Coins, Bill – can’t exist on two places at one time –Bearer bonds: immediate cashable.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
MIS 3090 IT for Financial Services Digital Cash September 4, 2015.
Electronic Payment Systems
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Bitcoin (what, why and how?)
The Present and Future of Electronic Payment Systems Vivek Reddy Information Assurance 5/19/04.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Lecture 8 e-money. Today Secure Electronic Transaction (SET) CyberCash On line payment system using e-money ECash NetCash MilliCent CyberCoin.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Electronic Cash. Digicash: Ecash u “With ecash you can pay for access to a database, buy software ora newsletter by ,play a computer game over the.
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Electronic Payment Systems.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
How to Make E-cash with Non-Repudiation and Anonymity Ronggong Song, Larry Korba Proceedings of the International Conference on Information.
1 Bitcoin A Digital Currency. Functions of Money.
E-Payment ECT 582 Robin Burke. Outline Characteristics Select protocols.
2/16/001 E-commerce Systems Electronic Payment Systems.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
Electronic Banking & Security Electronic Banking & Security.
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
Secure Electronic Transactions (SET)
Personal Financial Literacy
eCommerce Technology Lecture 13 Electronic Cash
Presentation transcript:

Anonymous Digital Cash  Ashok Reddy  Madhu Tera  Laxminarayan Muktinutalapati (Lux)  Venkat Nagireddy

Overview  What is digital cash?  Need for anonymous digital cash  Concepts in anonymous digital cash  Protocol: Dining Cryptographers’ protocol  Achieving anonymity  Illustration  Practical concerns  Conclusion

What Is Digital Cash?  Digital cash is a digitally signed payment message that serves as a medium of exchange

Need for Anonymous Digital Cash  Increase in electronic surveillance by governments and other institutions  Lack of privacy features associated with ordinary electronic transactions

Concepts in Anonymous Digital Cash Anonymity is chiefly concerned with  Unlinkability  Untraceability

Protocol  Dining cryptographers’ protocol

Dining Cryptographers…(2)  Model

Achieving Anonymity  Blind digital signatures  Blinding factor

Illustration  The Digital Bank would offer electronic bank notes: messages signed using a particular private key  The electronic bank notes could be authenticated using a corresponding public key  The bank would also make public, a key to authenticate electronic documents sent from the bank to its customers

Illustration…(2)  To withdraw a dollar from the bank, Alice generates a note number (each note bears a different number, akin to the serial number on a bill); she chooses a 100-digit number at random  Before sending the note number to the bank for signing, Alice multiplies it by a random (blinding) factor  Now she signs the number with the private key corresponding to her "digital pseudonym"

Illustration…(3)  After receiving the blinded note signed by the bank, Alice divides out the blinding factor and uses the note as before  The blinded note numbers are, therefore, "unconditionally untraceable"

Practical Concerns  Counterfeiting or Double-spending: Fraudulently spending the same money more than once Remedy:  Checking each note against an on-line central list when it is spent  Using tamper-resistant hardware (called an "observer")  Generating blinded notes that require the payer to answer a random numeric query about each note when making a payment

Practical Concerns…(2)  Framing: An attempt by a bank to fraudulently claim that a customer has double-spent the same piece of cash when the customer hasn’t. Remedy:  Similar to those discussed earlier

Practical Concerns…(3) Other concerns:  Theft  Adaptability

Conclusion  Anonymous cash is "unconditionally untraceable" which provides enough privacy to the user  A system (implementing anonymous digital cash) closely resembling our current payment system will be easier for consumers to understand and adapt to

Questions?