We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
CHEN Xiaofeng, WANG Changjie, WANG Yumin. Fair Electronic Cash Based on Double Signatures[J]. Journal of Computer Science and Technology, 2002, 17(6).
Citation: CHEN Xiaofeng, WANG Changjie, WANG Yumin. Fair Electronic Cash Based on Double Signatures[J]. Journal of Computer Science and Technology, 2002, 17(6).

Fair Electronic Cash Based on Double Signatures

More Information
  • Published Date: November 14, 2002
  • In order to decrease crimes such as money laundering, blackmailing etc.in electronic cash systems, fair electronic cash has been a major focusof academic research in electronic commence. When a bank finds somedubious cash or owner, the trusted entity or trustee can help him torevoke the anonymity of the cash. In the previous protocols, thetrustee knows all the information of the cash whether he is trusted ornot, that is, he can trace the user or cash unconditionally.Furthermore, the dishonest trustee may deceive a user, which means thathe may withdraw cash while tracing other users. Such cases are unfair tothe honest users.
  • Related Articles

    [1]Kai Lu, Peng-Fei Wang, Gen Li, Xu Zhou. Untrusted Hardware Causes Double-fetch Problems in the I/O Memory[J]. Journal of Computer Science and Technology, 2018, 33(3): 587-602. DOI: 10.1007/s11390-018-1842-3
    [2]Shengmin Xu, Guomin Yang, Yi Mu. A New Revocable and Re-Delegable Proxy Signature and Its Application[J]. Journal of Computer Science and Technology, 2018, 33(2): 380-399. DOI: 10.1007/s11390-018-1825-4
    [3]Xu Tan, Xiao-Wei Shen, Xiao-Chun Ye, Da Wang, Dong-Rui Fan, Lunkai Zhang, Wen-Ming Li, Zhi-Min Zhang, Zhi-Min Tang. A Non-Stop Double Buffering Mechanism for Dataflow Architecture[J]. Journal of Computer Science and Technology, 2018, 33(1): 145-157. DOI: 10.1007/s11390-017-1747-6
    [4]Cheng-Dong Jiang, Guo-Liang Chen. Double Barrier Coverage in Dense Sensor Networks[J]. Journal of Computer Science and Technology, 2008, 23(1): 154-165.
    [5]Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong. Revocable Ring Signature[J]. Journal of Computer Science and Technology, 2007, 22(6): 785-794.
    [6]LI JiGuo, CAO ZhenFu, ZHANG YiChen. Nonrepudiable Proxy Multi-Signature Scheme[J]. Journal of Computer Science and Technology, 2003, 18(3).
    [7]WEI Hua, LUO Yupin, YANG Shiyuan. Fault Tolerance of Reconfigurable Bi-Directional Double-Loop LANs[J]. Journal of Computer Science and Technology, 1999, 14(4): 379-385.
    [8]Min Yinghua, Yashwant K. Malaiya, Jin Boping. Aliasing Errors in Parallel Signature Analyzers[J]. Journal of Computer Science and Technology, 1990, 5(1): 24-40.
    [9]Li Layuan. A Routing Algorithm for Distributed Optimal Double Loop Computer Networks[J]. Journal of Computer Science and Technology, 1987, 2(2): 92-98.
    [10]Shen Li, Stephen Y.H.Su. Generalized Parallel Signature Analyzers with External Exclusive-OR Gates[J]. Journal of Computer Science and Technology, 1986, 1(4): 49-61.

Catalog

    Article views (5) PDF downloads (1485) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return