{"title":"基于生物特征的观察者自由转移电子现金","authors":"Kamlesh Tiwari, Phalguni Gupta","doi":"10.1145/2600918.2600934","DOIUrl":null,"url":null,"abstract":"This paper proposes a transaction strategy to implement transferable E-cash. It does not involve any third party observer at the time of transaction and possesses strong anonymity property. It uses biometric features of the legitimate holder of e-cash to progress the transaction. It works on the transfer of coin ownership and is built around the restrictive blinding and biometric digital signature scheme. Its mathematical model utilizes the hardness of discrete log problem and representation problem in groups. It guarantees anonymity and unlinkability for a genuine user and non repudiation to a fraudulent one.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Biometrics based observer free transferable E-cash\",\"authors\":\"Kamlesh Tiwari, Phalguni Gupta\",\"doi\":\"10.1145/2600918.2600934\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a transaction strategy to implement transferable E-cash. It does not involve any third party observer at the time of transaction and possesses strong anonymity property. It uses biometric features of the legitimate holder of e-cash to progress the transaction. It works on the transfer of coin ownership and is built around the restrictive blinding and biometric digital signature scheme. Its mathematical model utilizes the hardness of discrete log problem and representation problem in groups. It guarantees anonymity and unlinkability for a genuine user and non repudiation to a fraudulent one.\",\"PeriodicalId\":243756,\"journal\":{\"name\":\"Information Hiding and Multimedia Security Workshop\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Hiding and Multimedia Security Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2600918.2600934\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Hiding and Multimedia Security Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2600918.2600934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Biometrics based observer free transferable E-cash
This paper proposes a transaction strategy to implement transferable E-cash. It does not involve any third party observer at the time of transaction and possesses strong anonymity property. It uses biometric features of the legitimate holder of e-cash to progress the transaction. It works on the transfer of coin ownership and is built around the restrictive blinding and biometric digital signature scheme. Its mathematical model utilizes the hardness of discrete log problem and representation problem in groups. It guarantees anonymity and unlinkability for a genuine user and non repudiation to a fraudulent one.