Yiannis Tsiounis's research while affiliated with Northeastern University and other places

Publications (24)

Conference Paper
Full-text available
We present group encryption, a new cryptographic primitive which is the encryption analogue of a group signature. It possesses similar verifiability, security and privacy properties, but whereas a group signature is useful whenever we need to conceal the source (signer) within a group of legitimate users, a group encryption is useful whenever we ne...
Chapter
Cryptography has been instrumental in reducing the involvement of over-head third parties in protocols. For example; a digital signature scheme assures a recipient that a judge who is not present at message transmission will nevertheless approve the validity of the signature. Similarly, in off-line electronic cash the bank (which is off-line during...
Conference Paper
The IEEE 802.11 Wireless Local Area Network (WLAN) specifications have been the subject of increased attention due to their rapid commercial adaptation and the introduction of new security and privacy concerns. The IEEE 802.1x standard was introduced in order to overcome the initial security shortcomings of the Wired Equivalent Privacy (WEP) protoc...
Article
Full-text available
Currently, the Internet and the World Wide Web on-line business has boomed, with tra#c, advertising and content growing at sustained exponential rates. However, the full potential of on-line commerce has not been possible to realize due to the lack of convenient and secure electronic payment methods (e.g., for buying e-goods and paying with e-money...
Article
Full-text available
One of the key directions in complexity theory which has also filtered through to cryptographic research, is the e#ort to classify related but seemingly distinct notions. Separation or reduction arguments are the basic means for this classification.
Conference Paper
Full-text available
This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the underlying mathematical and protocol tools, present the concepts and the underlying security model, and then realize the scheme and its security proof. Traceable signatures support an exten...
Conference Paper
The legal framework provided by the Electronic Signature Act, enacted to law as of October 1, 2000, has fueled the interest for digital signature-based payment transactions over the Internet. The bulk of formalization and security analysis to date on such secure payments has focused on creating new secure channels for existing credit or debit card...
Article
We introduce the k-payment problem: given a total budget of N units, the problem is to represent this budget as a set of coins, so that any k exact payments of total value at most N can be made using k disjoint subsets of the coins. The goal is to minimize the number of coins for any given N and k, while allowing the actual payments to be made on-l...
Chapter
Full-text available
Currently, the Internet and the World Wide Web on-line business is booming, with traffic, advertising and content growing at sustained exponential rates. However, the full potential of on-line commerce has not been possible to realize due to the lack of convenient and secure electronic payment methods (e.g., for buying e-goods and paying with e-mon...
Article
Full-text available
. In Crypto '93, S. Brands presented a very efficient off-line electronic cash scheme based on the representation problem in groups of prime order. In Crypto '95 a very efficient off-line divisible e-cash scheme based on factoring Williams integers was presented by T. Okamoto. We demonstrate one efficient attack on Okamoto's scheme and two on Brand...
Article
Full-text available
. Electronic cash, and other cryptographic payment systems, offer some level of user anonymity during a purchase, in order to emulate electronically the properties of physical cash exchange. However, it has been noted that there are crime-prevention situations where anonymity of notes is undesirable; in addition there may be regulatory and legal co...
Conference Paper
Full-text available
One of the key directions in complexity theory which has also filtered through to cryptographic research, is the effort to classify related but seemingly distinct notions. Separation or reduction arguments are the basic means for this classification. Continuing this direction we identify a class of problems, called “matching problems,” which are re...
Conference Paper
Full-text available
Anonymous off-line electronic cash (e-cash) systems provide transactions that retain the anonymity of the payer, similar to physical cash exchanges, without requiring the issuing bank to be on-line at payment. Fair off-line e-cash extend this capability to allow a qualified third party (a “trustee”) to revoke this anonymity under a warrant or other...
Conference Paper
Full-text available
Recently, there has been an interest in creating practical anonymous electronic cash with the ability to conduct payments of exact amounts, as is typically the practice in physical payment systems. The most general solution for such payments is to allow electronic coins to be divisible (e.g., each coin can be spent incrementally but total purchases...
Conference Paper
Any system which contains some form of cryptographic authentication, confidentiality and/or identification requires the provisioning of a secure key generation and distribution capability. The key distribution mechanism for wireless cellular systems, such as IS-95 CDMA, IS-136 TDMA and IS-91 Analog, has recently been investigated by the Telephone I...
Conference Paper
Full-text available
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven based on clearly understood and accepted primitives. Here we show directly that the decision Diffie-Hellman assumption implies the security of the original ElGamal encryptio...
Conference Paper
We consider the k-payment problem: given a total budget of N units, the problem is to represent this budget as a set of coins, so that any k exact payments of total value at most N can be made using k disjoint subsets of the coins. The goal is to minimize the number of coins for any given N and k, while allowing the actual payments to be made on-li...
Conference Paper
Full-text available
Electronic cash, and other cryptographic payment systems, offer a level of user anonymity during a purchase, in order to emulate electronically the properties of physical cash exchange. However, it has been noted that there are crime-prevention situations where anonymity of notes is undesirable; in addition there may be regulatory and legal constra...
Conference Paper
Full-text available
In Crypto '93, S. Brands presented a very efficient off-line electronic cash scheme based on the representation problem in groups of prime order. In Crypto '95 a very efficient off-line divisible e-cash scheme based on factoring Williams integers was presented by T. Okamoto. We demonstrate one efficient attack on Okamoto's scheme and two on Brands'...
Conference Paper
Full-text available
Cryptography has been instrumental in reducing the involvement of over-head third parties in protocols. For example; a digital signature scheme assures a recipient that a judge who is not present at message transmission will nevertheless approve the validity of the signature. Similarly, in off-line electronic cash the bank (which is off-line during...
Article
Currently, the Internet and the World Wide Web on-line business is booming, with trac, advertising and content growing at sustained exponential rates. However, the full potential of on-line com- merce has not been possible to realize due to the lack of convenient and secure electronic payment methods (e.g., for buying e-goods and paying with e-mone...

Citations

... Brand introduced a restrictive blind signature scheme where a client provides zero-knowledge proof along with his identity in the resulting blind signature [6,7]. The scheme is inadequate to prevent double spending of e-coin if a malicious user can construct a forged identity and can spend the e-coin multiple times [8]. Fujisaki and Okamoto introduced a partially blind signature to overcome the downsides of carrying public and private keys where bank needs to maintain a huge database of every client [9,10]. ...
... It is related to certain well-known problems [16] such as postagestamp problem, knapsack problem, and change-making problem. The closest one is the k-payment problem [17], which was motivated by electronic cash model, where exact representation of each payment by the corresponding set of coins is required. Our problem, in contrast, is motivated by optical switching, where the hardware cost depends on the size of switching matrix, while the switched wavebands (coins) may or may not be completely occupied by wavelengths (units) unlike the k-payment problem. ...
... Nevertheless, some alternative e-cash systems were proposed that managed to avoid the growth of the e-cash data (D'Amiano and Di Crescenzo, 1994;Okamoto, 1995). However, as mentioned in Chan et al. (1998), Tsiounis (1997), those e-schemes had other issues such as the limit of the total size of payments or lack of efficiency of e-cash protocols. In Fuchsbauer (2009) an attempt was made to construct a transferable e-cash scheme without the aforementioned data growth problem. ...
... We note that revocable anonymity is a concept which has been considered at great length in other fields, such as digital cash [27,28,31,10,17]. In digital cash, it is particularly important that it should be possible to link an electronic coin to the person who spent it once the transaction has occurred (for example, that coin may have been spent twice, or spent illegally). ...
... En la década de los noventa, toma impulso el movimiento Cypherpunk, inspirado en los principios de la anarquía digital y un conocimiento de matemáticas avanzadas, alentando el uso de sistemas criptográficos que permitieran salvaguardar la información personal y la privacidad en los pagos (Cavaller Riva y Ortega Yubro, 2021). Por estos años, nacieron proyectos como B-Money (Brands, 1994) y Bit Gold (Frankel et al., 1996) con la intención de eliminar a los intermediarios en los procesos de negociación. Cabe destacar la iniciativa de David Chaum que en 1990 lanza DigiCash y, posteriormente, eCash, que permitía realizar pagos con dinero electrónico a través de computadoras empleando solamente un software. ...
... The idea of determining whether a committed integer falls within a given range was first proposed in [19] and further expanded in [13,15]. The CFT Proof [16] achieves the goal of demonstrating that a secret value is within a given range. However, the CFT proof has a very high expansion rate. ...
... After double spending, the bank would be able to clear the structure in a polynomial time. Although Brands' scheme suffers from some weaknesses in misrepresenting the identity of the customer [17], some solutions have been proposed to prevent these weaknesses [10] [17]. Afterward, some schemes have been presented, which use a similar method to Bands' restrictive blind signature, to detect the identity of a double spender [18] [19] [20]. ...
... This technology prevented centralized institutions that provide signatures from linking users to their transactions. A series of other digital currency payment technologies like J. Wu et al. universal electronic cash (Okamoto and Ohta, 1991), untraceable offline cash (Brands, 1993), fair blind signatures (Stadler et al., 1995), fair off-line e-cash (Frankel et al., 1996) later emerged in the 1990s. However, a common problem existed in these technologies is that-trusted third parties are needed to detect double spending attacks. ...
... Nevertheless, in 1998, Frankel, Tsiounis and Yung in [26] pointed out that to date, there have been no efficient systems that could offer provable security. They proposed a fair off-line e-cash system, where the trusted third party could revoke the anonymity under a warrant or in the case of specified suspicious activity. ...
... Our scheme adopts credit-based charging, i.e. the system charges each mobile user after it has finished a sequence of services for the user, just as the practical situation in the real world. It is different from the others which provided approaches of debit-based charging, i.e. each mobile user has to purchase payment token(s) before she/he starts accessing the services provided by the system [6,12]. What are the differences between charging mobile users in advance and charging them after the services? ...