• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Xin, Zhang Bo. Improved Endorsed E-Cash System with DAA-A[J]. Journal of Computer Research and Development, 2016, 53(10): 2412-2429. DOI: 10.7544/issn1000-1239.2016.20160413
Citation: Liu Xin, Zhang Bo. Improved Endorsed E-Cash System with DAA-A[J]. Journal of Computer Research and Development, 2016, 53(10): 2412-2429. DOI: 10.7544/issn1000-1239.2016.20160413

Improved Endorsed E-Cash System with DAA-A

More Information
  • Published Date: September 30, 2016
  • At present, the existing endorsed e-cash system has a low communication efficiency, and its fair exchange protocol employs inefficient cut-and-choose proofs. In addition, the centralized TTP (trusted third party) is vulnerable to denial-of-service attacks. So far, several related fair payment systems have been proposed. Unfortunately, some of them use cut-and-choose proofs, and the others adopt verifiable encryption schemes with security flaw. Inspired by the idea of self-blindable attribute-based credentials, a concrete DAA-A (direct anonymous attestation with attributes) scheme is constructed. Based on the new DAA-A scheme, an improved endorsed e-cash system is proposed, which achieves a high level of exculpability. In order to improve users’ computational efficiency in the spending process, the set-membership proof by Arfaoui et al’s is adopted, and the efficiency of user’s signature of knowledge is also optimized with the technique of pre-computation. In order to bypass the expensive cut-and-choose proof, a new optimistic fair exchange sub-protocol supporting distributed TTPs is provided. Furthermore, if combined with the Golle-Mironov model, the new system also suits for the environment of outsourcing computing. Compared with the previous similar ones, the new system meets several desirable properties simultaneously, i.e., it supports multiple payments, and does not depend on cut-and-choose proofs and allows users to be stateless, etc. What’s more, the fair exchange protocol of the new system considers the risk of denial-of-service attacks.
  • Related Articles

    [1]Chen Zhenzhu, Zhou Chunyi, Su Mang, Gao Yansong, Fu Anmin. Research Progress of Secure Outsourced Computing for Machine Learning[J]. Journal of Computer Research and Development, 2023, 60(7): 1450-1466. DOI: 10.7544/issn1000-1239.202220767
    [2]Zhao Chuan, Xu Jun. Secure Multi-Party Computation Based on Cut-and-Choose Technology[J]. Journal of Computer Research and Development, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664
    [3]Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei. Research Advances on Privacy Preserving in Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
    [4]Gao Jiaxin, Sun Jiameng, Qin Jing. Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation[J]. Journal of Computer Research and Development, 2019, 56(10): 2160-2169. DOI: 10.7544/issn1000-1239.2019.20190323
    [5]Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu. Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead[J]. Journal of Computer Research and Development, 2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
    [6]Zhao Zhiyuan, Wang Jianhua, Xu Kaiyong, Guo Songhui. Fully Outsourced Attribute-Based Encryption with Verifiability for Cloud Storage[J]. Journal of Computer Research and Development, 2019, 56(2): 442-452. DOI: 10.7544/issn1000-1239.2019.20170883
    [7]Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia. Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server[J]. Journal of Computer Research and Development, 2018, 55(11): 2482-2489. DOI: 10.7544/issn1000-1239.2018.20170420
    [8]Jiang Han, Xu Qiuliang. Secure Multiparty Computation in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162. DOI: 10.7544/issn1000-1239.2016.20160685
    [9]Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian. A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment[J]. Journal of Computer Research and Development, 2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749
    [10]Wang Hao, Zheng Zhihua, Wu Lei, Wang Yilei. Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption[J]. Journal of Computer Research and Development, 2015, 52(10): 2270-2280. DOI: 10.7544/issn1000-1239.2015.20150497

Catalog

    Article views (998) PDF downloads (385) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return