A practical approach defeating blackmailing

Dong Guk Han, Hye Young Park, Young Ho Park, Sangjin Lee, Dong Hoon Lee, Hyung Jin Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently Kügler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages464-481
Number of pages18
Volume2384
ISBN (Print)3540438610, 9783540438618
Publication statusPublished - 2002
Event7th Australasian Conference on Information Security and Privacy, ACISP 2002 - Melbourne, Australia
Duration: 2002 Jul 32002 Jul 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2384
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other7th Australasian Conference on Information Security and Privacy, ACISP 2002
CountryAustralia
CityMelbourne
Period02/7/302/7/5

Fingerprint

Anonymity
Undeniable Signature
Blind Signature
Privacy
Electronics
Requirements
Banks
Electronic money
Money

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H., & Yang, H. J. (2002). A practical approach defeating blackmailing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2384, pp. 464-481). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2384). Springer Verlag.

A practical approach defeating blackmailing. / Han, Dong Guk; Park, Hye Young; Park, Young Ho; Lee, Sangjin; Lee, Dong Hoon; Yang, Hyung Jin.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2384 Springer Verlag, 2002. p. 464-481 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Han, DG, Park, HY, Park, YH, Lee, S, Lee, DH & Yang, HJ 2002, A practical approach defeating blackmailing. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 2384, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2384, Springer Verlag, pp. 464-481, 7th Australasian Conference on Information Security and Privacy, ACISP 2002, Melbourne, Australia, 02/7/3.
Han DG, Park HY, Park YH, Lee S, Lee DH, Yang HJ. A practical approach defeating blackmailing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2384. Springer Verlag. 2002. p. 464-481. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Han, Dong Guk ; Park, Hye Young ; Park, Young Ho ; Lee, Sangjin ; Lee, Dong Hoon ; Yang, Hyung Jin. / A practical approach defeating blackmailing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2384 Springer Verlag, 2002. pp. 464-481 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{a527e9dd0c7042a0be89031ef61bf8d0,
title = "A practical approach defeating blackmailing",
abstract = "To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently K{\"u}gler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.",
author = "Han, {Dong Guk} and Park, {Hye Young} and Park, {Young Ho} and Sangjin Lee and Lee, {Dong Hoon} and Yang, {Hyung Jin}",
year = "2002",
language = "English",
isbn = "3540438610",
volume = "2384",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "464--481",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - A practical approach defeating blackmailing

AU - Han, Dong Guk

AU - Park, Hye Young

AU - Park, Young Ho

AU - Lee, Sangjin

AU - Lee, Dong Hoon

AU - Yang, Hyung Jin

PY - 2002

Y1 - 2002

N2 - To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently Kügler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.

AB - To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently Kügler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.

UR - http://www.scopus.com/inward/record.url?scp=84947424392&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84947424392&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84947424392

SN - 3540438610

SN - 9783540438618

VL - 2384

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 464

EP - 481

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -