Skip to main content

Research of Atomic and Anonymous Electronic Commerce Protocol

  • Conference paper
  • First Online:
Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (RSFDGrC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2639))

Abstract

Atomicity and anonymity are the two important requirements for application in electronic commerce. However absolutely anonymity may lead to confliction with law enforcement, e.g. blackmailing or money laundering. Therefore, it is important to design systems satisfying both atomicity and revocable anonymity. Based on the concept of two-phase commitment, we realize atomicity in electronic transaction with the Trusted Third Part as coordinator. Also we develops Brands’ fair signature model, propose a method to enable not only anonymity but also owner-trace and money-trace.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Larry Loeb. Secure Electronic Transactions Introduction and Technical Reference. ARTECH HOUSE, INC. 1998

    Google Scholar 

  2. B. Cox, J. D. Tygar, M. Sirbu, Netbill security and transaction protocol. Proceedings of the 1st USENIX Workshop on Electronic Commerce. 1995:77–88

    Google Scholar 

  3. D. Chaum, A. Fiat, M. Naor. Untraceable electronic cash. Advances in cryptology: Crypto’88 Proceedings, Springer Verlay, 1990:200–212

    Google Scholar 

  4. S. von Solms and D. Naccache. On blind signatures and perfect crimes. Computers and Security. October, 1992, 11(6): 581–583

    Article  Google Scholar 

  5. D. Chaum, J.H. Evertse, J. van de Graff, R. Peralta. Demonstrating Possession of a Discrete Logarithm without Revealing It. Advances in Cryptology-CRYPTO’ 86 Proceedings. Springer Verlag. 1987: 200–212

    Google Scholar 

  6. S. Brands. Untraceable Off-line Cash in Wallets with Observers. In Advances in Cryptology-Proceedings of CRYPTO’93, Lecture Notes in Computer Science. Springer Verlag. 1993, 773:302–318

    Google Scholar 

  7. M. Stadler, M. M. Piveteau, J. Camenisch. Fair blind signatures. In L. C. Guillou and J.J. Quisquater, editors, Advances in Cryptology-EUROCRYPT’95, Lecture Notes in Computer Science, Springer Verlag. 1995, 921:209–219

    Google Scholar 

  8. J. D. Tygar. Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce. Proceedings of the 24th VLDB Conference, New York, USA, 1998:1–12

    Google Scholar 

  9. J. D. Tygar. Atomicity in Electronic Commerce. Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996, 5:8–26

    Article  Google Scholar 

  10. L. Camp, M. Harkavy, J. D. Tygar, B. Yee. Anonymous Atomic Transactions. In Proceedings of 2nd Usenix Workshop on Electronic Commerce. 1996, 11:123–133

    Google Scholar 

  11. Tang Jie. The Research of Atomic and Fair Anonymous Electronic Transaction Protocol. YanShan University. 2002:35–59

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tang, J., Li, JZ., Wang, KH., Cai, YR. (2003). Research of Atomic and Anonymous Electronic Commerce Protocol. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2003. Lecture Notes in Computer Science(), vol 2639. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39205-X_122

Download citation

  • DOI: https://doi.org/10.1007/3-540-39205-X_122

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-14040-5

  • Online ISBN: 978-3-540-39205-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics