2003
DOI: 10.1007/3-540-36504-4_19
|View full text |Cite
|
Sign up to set email alerts
|

Offline Payments with Auditable Tracing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2003
2003
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 12 publications
0
13
0
Order By: Relevance
“…We do not specifically address any of these areas, as the way in which they use the identity of the user is unimportant to us: it is the similarity in the need for the user's anonymity that matters. Very little existing work considers auditable revocable anonymity: Kugler and Vögt [11] discuss an electronic payment protocol in which the spender of a coin can determine (within a fixed period) whether their anonymity is revoked or not. Although the protocol is attractive, it requires knowledge a priori of who is to be traced-something which is not possible in fields such as electronic voting.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We do not specifically address any of these areas, as the way in which they use the identity of the user is unimportant to us: it is the similarity in the need for the user's anonymity that matters. Very little existing work considers auditable revocable anonymity: Kugler and Vögt [11] discuss an electronic payment protocol in which the spender of a coin can determine (within a fixed period) whether their anonymity is revoked or not. Although the protocol is attractive, it requires knowledge a priori of who is to be traced-something which is not possible in fields such as electronic voting.…”
Section: Related Workmentioning
confidence: 99%
“…. the detectability of inappropriate actions and accountability for origination suffices to prevent misbehaviour from happening [22, p. 5] Though protocols exist in electronic commerce which permit this ( [11], for example), the techniques used are not widely applicable, for reasons discussed above. We consider preliminary discussions of "escrowed data" stored in a digital envelope which use monotonic counters [1], and discuss the use of virtual monotonic counters [14] to allow multiple tokens to be securely stored by a single entity.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…Interestingly there are e-cash schemes that hold the authority accountable [15,16]. Unfortunately, these schemes require interaction with the tracing authority for every transaction and, as a result, the techniques do not necessarily scale.…”
Section: Related Workmentioning
confidence: 99%
“…In any case, no other protocol discusses revocable anonymity at all, to our knowledge. We note that revocable anonymity is a concept which has been considered at great length in other fields, such as digital cash [14,15,17].…”
Section: Related Workmentioning
confidence: 99%