A practical approach defeating blackmailing

Dong Guk Han, Hye Young Park, Young Ho Park, Sangjin Lee, Dong Hoon Lee, Hyung Jin Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently Kügler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings
EditorsLynn Batten, Jennifer Seberry
PublisherSpringer Verlag
Pages464-481
Number of pages18
ISBN (Print)3540438610, 9783540438618
DOIs
Publication statusPublished - 2002
Event7th Australasian Conference on Information Security and Privacy, ACISP 2002 - Melbourne, Australia
Duration: 2002 Jul 32002 Jul 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2384
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th Australasian Conference on Information Security and Privacy, ACISP 2002
CountryAustralia
CityMelbourne
Period02/7/302/7/5

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A practical approach defeating blackmailing'. Together they form a unique fingerprint.

  • Cite this

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H., & Yang, H. J. (2002). A practical approach defeating blackmailing. In L. Batten, & J. Seberry (Eds.), Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings (pp. 464-481). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2384). Springer Verlag. https://doi.org/10.1007/3-540-45450-0_35