@article{nakamoto2008bitcoin, title={Bitcoin: A peer-to-peer electronic cash system}, author={Nakamoto, Satoshi}, year={2008} } @InProceedings{apod, author = {Elli Androulaki and Steven Bellovin}, title = {APOD: Anonymous Physical Object Delivery}, booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)}, year = {2009}, } @Article{blum1981, author = {Manuel Blum}, title = {Coin Flipping by Telephone}, journal = {CRYPTO}, year = {1981}, pages = {11-15}, } @misc{BOLT, author = {Matthew Green and Ian Miers}, title = {Bolt: Anonymous Payment Channels for Decentralized Currencies}, howpublished = {Cryptology ePrint Archive, Report 2016/701}, year = {2016}, note = {\url{http://eprint.iacr.org/2016/701}}, } @inproceedings{danezis2016rscoin, author = {George Danezis and Sarah Meiklejohn}, title = {Centrally Banked Cryptocurrencies}, booktitle = {23nd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, year = {2016}, booktitle = {23nd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, } @Misc{greece2015cash, author = {Reuters}, title = {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday}, howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}}, month = {June}, year = {2015}, } @Misc{france2015cash, author = {Heinz-Peter Bader}, title = {France steps up monitoring of cash payments to fight low-cost terrorism}, howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}}, month = {Mar}, year = {2015}, } @Misc{fatf1997, title = {FATF-IX report on money laundering typologies}, howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}}, month = {feb}, year = {1998}, } @InProceedings{sander1999escrow, author = {Tomas Sander and Amnon Ta-Shma}, title = {On Anonymous Electronic Cash and Crime}, booktitle = {ISW'99}, year = {1999}, series = {LNCS 1729}, pages = {202--206}, } @Article{solms1992perfect, author = {Sebastiaan H. von Solms and David Naccache}, title = {On blind signatures and perfect crimes}, journal = {Computers \& Security}, year = {1992}, volume = {11}, number = {6}, pages = {581--583}, } @unpublished{cryptonote, author = {van Saberhagen, Nicolas}, month = oct, posted-at = {2016-09-18 11:44:05}, priority = {2}, title = {{CryptoNote v 2.0}}, url = {https://cryptonote.org/whitepaper.pdf}, year = {2013} } @inproceedings{chaum1990untraceable, title={Untraceable electronic cash}, author={Chaum, David and Fiat, Amos and Naor, Moni}, booktitle={Proceedings on Advances in cryptology}, pages={319--327}, year={1990}, organization={Springer-Verlag New York, Inc.} } @inproceedings{chaum1983blind, title={Blind signatures for untraceable payments}, author={Chaum, David}, booktitle={Advances in cryptology}, pages={199--203}, year={1983}, organization={Springer} } @inproceedings{rivest2004peppercoin, title={Peppercoin micropayments}, author={Rivest, Ronald L}, booktitle={Financial Cryptography}, pages={2--8}, year={2004}, organization={Springer} } @inproceedings{Camenisch05compacte-cash, author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, title = {Compact e-cash}, booktitle = {In EUROCRYPT, volume 3494 of LNCS}, year = {2005}, pages = {302--321}, publisher = {Springer-Verlag}, url = {http://cs.brown.edu/~anna/papers/chl05-full.pdf}, url_citeseerx = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.4640} } @Inbook{ST99, author="Sander, Tomas and Ta-Shma, Amnon", editor="Wiener, Michael", title="Auditable, Anonymous Electronic Cash", bookTitle="Advances in Cryptology --- CRYPTO' 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15--19, 1999 Proceedings", year="1999", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="555--572", isbn="978-3-540-48405-9", doi="10.1007/3-540-48405-1_35", doi_url="http://dx.doi.org/10.1007/3-540-48405-1_35", url = {http://www.cs.tau.ac.il/~amnon/Papers/ST.crypto99.pdf"} } @inproceedings{zerocash, author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza}, title = {Zerocash: Decentralized Anonymous Payments from Bitcoin}, booktitle = {IEEE Symposium on Security \& Privacy}, year = {2014}, } @inproceedings{miers2013zerocoin, title={Zerocoin: Anonymous distributed e-cash from bitcoin}, author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D}, booktitle={Security and Privacy (SP), 2013 IEEE Symposium on}, pages={397--411}, year={2013}, organization={IEEE} } @InProceedings{fc2014murdoch, author = {Stephen Murdoch and Ross Anderson}, title = {Security Protocols and Evidence: Where Many Payment Systems Fail}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, } @book{engels1844, author = "Friedrich Engels", title = "{Umrisse zu einer Kritik der National\"okonomie}", year = "1844", publisher = "Ruge and Marx, Paris", } @inproceedings{selby2004analyzing, title={Analyzing the Success and Failure of Recent e-Payment Schemes}, author={Selby, Jack R}, booktitle={Financial Cryptography}, pages={1--1}, year={2004}, organization={Springer} } @misc{brands1993efficient, title={An efficient off-line electronic cash system based on the representation problem}, author={Brands, Stefan A}, year={1993}, publisher={Centrum voor Wiskunde en Informatica} } @article{dent2008extensions, title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements}, author={Dent, AW and Paterson, KG and Wild, PR}, year={2008} } @article{dent2008preliminary, title={Preliminary Report on Chaum's Online E-Cash Architecture}, author={Dent, AW and Paterson, KG and Wild, PR}, journal={Royal Holloway, University of London}, year={2008} } @inproceedings{tor-design, title = {Tor: The Second-Generation Onion Router}, author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, booktitle = {Proceedings of the 13th USENIX Security Symposium}, year = {2004}, month = {August}, www_important = {1}, www_tags = {selected}, www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html}, www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf}, www_section = {Anonymous communication}, } @inbook{BellareRogaway1996, author="Bellare, Mihir and Rogaway, Phillip", editor="Maurer, Ueli", chapter="The Exact Security of Digital Signatures-How to Sign with RSA and Rabin", title="Advances in Cryptology --- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12--16, 1996 Proceedings", year="1996", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="399--416", isbn="978-3-540-68339-1", doi="10.1007/3-540-68339-9_34", url_doi="http://dx.doi.org/10.1007/3-540-68339-9_34", url="http://web.cs.ucdavis.edu/~rogaway/papers/exact.pdf" } @article{martens2015practical, title={Practical Divisible E-Cash.}, author={M{\"a}rtens, Patrick}, journal={IACR Cryptology ePrint Archive}, volume={2015}, pages={318}, year={2015} } @book{molander1998cyberpayments, title={Cyberpayments and money laundering: Problems and promise}, author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A}, volume={965}, year={1998}, publisher={Rand Corporation} } @inproceedings{rupp2013p4r, title={P4R: Privacy-preserving pre-payments with refunds for transportation systems}, author={Rupp, Andy and Hinterw{\"a}lder, Gesine and Baldimtsi, Foteini and Paar, Christof}, booktitle={International Conference on Financial Cryptography and Data Security}, pages={205--212}, year={2013}, organization={Springer} } @article{OneMoreInversion, author="Bellare and Namprempre and Pointcheval and Semanko", title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ", journal="Journal of Cryptology", volume="16", number="3", pages="185--215", abstract="We introduce a new class of computational problems which we call the ``one-more-RSA-inversion'' problems. Our main result is that two problems in this class, which we call the chosen-target and known-target inversion problems, respectively, have polynomially equivalent computational complexity. We show how this leads to a proof of security for Chaum's RSA-based blind signature scheme in the random oracle model based on the assumed hardness of either of these problems. We define and prove analogous results for ``one-more-discrete-logarithm'' problems. Since the appearence of the preliminary version of this paper, the new problems we have introduced have found other uses as well.", issn="1432-1378", doi="10.1007/s00145-002-0120-1", doi_url="http://dx.doi.org/10.1007/s00145-002-0120-1", url="https://eprint.iacr.org/2001/002" } @inbook{RSA-HDF-KTIvCTI, author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael", editor="Syverson, Paul", chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme", title="Financial Cryptography: 5th International Conference", year="2002", publisher="Springer", address="Berlin, Heidelberg", pages="319--338", isbn="978-3-540-46088-6", doi="10.1007/3-540-46088-8_25", url="https://www.di.ens.fr/~pointche/Documents/Papers/2001_fcA.pdf" } @inbook{Coron2000, author="Coron, Jean-S{\'e}bastien", editor="Bellare, Mihir", chapter="On the Exact Security of Full Domain Hash", title="Advances in Cryptology --- CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20--24, 2000 Proceedings", year="2000", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="229--235", isbn="978-3-540-44598-2", doi="10.1007/3-540-44598-6_14", doi_url="http://dx.doi.org/10.1007/3-540-44598-6_14", url="https://www.iacr.org/archive/crypto2000/18800229/18800229.pdf" }