summaryrefslogtreecommitdiff
path: root/doc/paper/taler.bib
blob: 7f986a76c4613344188e9d372d5324ac9fc7c53c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
@article{nakamoto2008bitcoin,
  title={Bitcoin: A peer-to-peer electronic cash system},
  author={Nakamoto, Satoshi},
  year={2008}
}

@inproceedings{ BDL+11,
  author        = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
  title         = {High-speed high-security signatures},
  booktitle     = {Cryptographic Hardware and Embedded Systems -- {CHES 2011}},
  editor        = {Bart Preneel and Tsuyoshi Takagi},
  series        = {Lecture Notes in Computer Science},
  publisher     = {Springer-Verlag Berlin Heidelberg},
  volume        = {6917},
  year          = {2011},
  pages         = {124--142},
}

@article{eddsa,
  author        = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
  title         = {High-speed high-security signatures},
  journal       = {Journal of Cryptographic Engineering},
  publisher     = {Springer-Verlag Berlin Heidelberg},
  volume        = {2},
  number        = {2},
  year          = {2012},
  pages         = {77--89},
}

@misc{cryptoeprint:2015:677,
    author = {Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
    title = {EdDSA for more curves},
    howpublished = {Cryptology ePrint Archive, Report 2015/677},
    year = {2015},
    note = {\url{http://eprint.iacr.org/2015/677}},
}

@InProceedings{apod,
  author =       {Elli Androulaki and Steven Bellovin},
  title =        {APOD: Anonymous Physical Object Delivery},
  booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)},
  year =      {2009},
}

@Article{blum1981,
  author = 	 {Manuel Blum},
  title = 	 {Coin Flipping by Telephone},
  journal = 	 {CRYPTO},
  year = 	 {1981},
  pages = 	 {11-15},
}


@misc{BOLT,
    author = {Matthew Green and Ian Miers},
    title = {Bolt: Anonymous Payment Channels for Decentralized Currencies},
    howpublished = {Cryptology ePrint Archive, Report 2016/701},
    year = {2016},
    note = {\url{http://eprint.iacr.org/2016/701}},
}

@inproceedings{danezis2016rscoin,
  author    = {George Danezis and
               Sarah Meiklejohn},
  title     = {Centrally Banked Cryptocurrencies},
  booktitle = {23nd Annual Network and Distributed System Security Symposium, {NDSS}
               2016, San Diego, California, USA, February 21-24, 2016},
  year      = {2016},
  publisher = {The Internet Society},
}

@Misc{greece2015cash,
  author =    {Reuters},
  title =     {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday},
  howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}},
  month =     {June},
  year =      {2015},
}

@Misc{france2015cash,
  author =    {Heinz-Peter Bader},
  title =     {France steps up monitoring of cash payments to fight low-cost terrorism},
  howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}},
  month =     {Mar},
  year =      {2015},
}


@Misc{fatf1997,
  title =     {FATF-IX report on money laundering typologies},
  howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}},
  month =     {feb},
  year =      {1998},
}

@InProceedings{sander1999escrow,
  author =       {Tomas Sander and Amnon Ta-Shma},
  title =        {On Anonymous Electronic Cash and Crime},
  booktitle = {ISW'99},
  year =      {1999},
  series =    {LNCS 1729},
  pages =     {202--206},
}

@Article{solms1992perfect,
  author =       {Sebastiaan H. von Solms and David Naccache},
  title =        {On blind signatures and perfect crimes},
  journal = {Computers \& Security},
  year =      {1992},
  volume =    {11},
  number =    {6},
  pages =     {581--583},
}

@unpublished{cryptonote,
    author = {van Saberhagen, Nicolas},
    month = oct,
    posted-at = {2016-09-18 11:44:05},
    priority = {2},
    title = {{CryptoNote v 2.0}},
    url = {https://cryptonote.org/whitepaper.pdf},
    year = {2013}
}

@inproceedings{chaum1990untraceable,
  title={Untraceable electronic cash},
  author={Chaum, David and Fiat, Amos and Naor, Moni},
  booktitle={Proceedings on Advances in cryptology},
  pages={319--327},
  year={1990},
  organization={Springer-Verlag New York, Inc.}
}

@inproceedings{chaum1983blind,
  title={Blind signatures for untraceable payments},
  author={Chaum, David},
  booktitle={Advances in cryptology},
  pages={199--203},
  year={1983},
  organization={Springer}
}

@inproceedings{rivest2004peppercoin,
  title={Peppercoin micropayments},
  author={Rivest, Ronald L},
  booktitle={Financial Cryptography},
  pages={2--8},
  year={2004},
  organization={Springer}
}


@inproceedings{Camenisch05compacte-cash,
  author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya},
  title = {Compact e-cash},
  booktitle = {In EUROCRYPT, volume 3494 of LNCS},
  year = {2005},
  pages = {302--321},
  publisher = {Springer-Verlag},
  url = {http://cs.brown.edu/~anna/papers/chl05-full.pdf},
  url_citeseerx = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.4640}
}


@Inbook{ST99,
  author="Sander, Tomas and Ta-Shma, Amnon",
  editor="Wiener, Michael",
  title="Auditable, Anonymous Electronic Cash",
  bookTitle="Advances in Cryptology --- CRYPTO' 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15--19, 1999 Proceedings",
  year="1999",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="555--572",
  isbn="978-3-540-48405-9",
  doi="10.1007/3-540-48405-1_35",
  doi_url="http://dx.doi.org/10.1007/3-540-48405-1_35",
  url = {http://www.cs.tau.ac.il/~amnon/Papers/ST.crypto99.pdf"}
}


@inproceedings{zerocash,
  author = 	 {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
  title = 	 {Zerocash: Decentralized Anonymous Payments from Bitcoin},
  booktitle = 	 {IEEE Symposium on Security \& Privacy},
  year = 	 {2014},
}

@inproceedings{miers2013zerocoin,
  title={Zerocoin: Anonymous distributed e-cash from bitcoin},
  author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
  booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
  pages={397--411},
  year={2013},
  organization={IEEE}
}




@Inbook{AccountableZerocash,
  author="Garman, Christina and Green, Matthew and Miers, Ian",
  editor="Grossklags, Jens and Preneel, Bart",
  title="Accountable Privacy for Decentralized Anonymous Payments",
  bookTitle="Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised Selected Papers",
  year="2017",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="81--98",
  isbn="978-3-662-54970-4",
  doi="10.1007/978-3-662-54970-4_5",
  doi_url="http://dx.doi.org/10.1007/978-3-662-54970-4_5",
  url = {http://eprint.iacr.org/2016/061}
}


@InProceedings{fc2014murdoch,
  author =       {Stephen Murdoch and Ross Anderson},
  title =        {Security Protocols and Evidence: Where Many Payment Systems Fail},
  booktitle = {Financial Cryptography and Data Security},
  year =      {2014},
}

@book{engels1844,
  author = 	 "Friedrich Engels",
  title = 	 "{Umrisse zu einer Kritik der National\"okonomie}",
  year = 	 "1844",
  publisher = "Ruge and Marx, Paris",
}


@inproceedings{selby2004analyzing,
  title={Analyzing the Success and Failure of Recent e-Payment Schemes},
  author={Selby, Jack R},
  booktitle={Financial Cryptography},
  pages={1--1},
  year={2004},
  organization={Springer}
}

@misc{brands1993efficient,
  title={An efficient off-line electronic cash system based on the representation problem},
  author={Brands, Stefan A},
  year={1993},
  publisher={Centrum voor Wiskunde en Informatica}
}

@article{dent2008extensions,
  title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements},
  author={Dent, AW and Paterson, KG and Wild, PR},
  year={2008}
}

@article{dent2008preliminary,
  title={Preliminary Report on Chaum's Online E-Cash Architecture},
  author={Dent, AW and Paterson, KG and Wild, PR},
  journal={Royal Holloway, University of London},
  year={2008}
}



@inproceedings{tor-design,
  title = {Tor: The Second-Generation Onion Router},
  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  booktitle = {Proceedings of the 13th USENIX Security Symposium},
  year = {2004},
  month = {August},
  www_important = {1},
  www_tags = {selected},
  www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html},
  www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf},
  www_section = {Anonymous communication},
}


@inbook{BellareRogaway1996,
  author="Bellare, Mihir and Rogaway, Phillip",
  editor="Maurer, Ueli",
  chapter="The Exact Security of Digital Signatures-How to Sign with RSA and Rabin",
  title="Advances in Cryptology --- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12--16, 1996 Proceedings",
  year="1996",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="399--416",
  isbn="978-3-540-68339-1",
  doi="10.1007/3-540-68339-9_34",
  url_doi="http://dx.doi.org/10.1007/3-540-68339-9_34",
  url="http://web.cs.ucdavis.edu/~rogaway/papers/exact.pdf"
}

@article{martens2015practical,
  title={Practical Divisible E-Cash.},
  author={M{\"a}rtens, Patrick},
  journal={IACR Cryptology ePrint Archive},
  volume={2015},
  pages={318},
  year={2015}
}

@book{molander1998cyberpayments,
  title={Cyberpayments and money laundering: Problems and promise},
  author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A},
  volume={965},
  year={1998},
  publisher={Rand Corporation}
}

@inproceedings{rupp2013p4r,
  title={P4R: Privacy-preserving pre-payments with refunds for transportation systems},
  author={Rupp, Andy and Hinterw{\"a}lder, Gesine and Baldimtsi, Foteini and Paar, Christof},
  booktitle={International Conference on Financial Cryptography and Data Security},
  pages={205--212},
  year={2013},
  organization={Springer}
}


@article{OneMoreInversion,
  author="Bellare and Namprempre and Pointcheval and Semanko",
  title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
  journal="Journal of Cryptology",
  volume="16",
  number="3",
  pages="185--215",
  abstract="We introduce a new class of computational problems which we call the ``one-more-RSA-inversion'' problems. Our main result is that two problems in this class, which we call the chosen-target and known-target inversion problems, respectively, have polynomially equivalent computational complexity. We show how this leads to a proof of security for Chaum's RSA-based blind signature scheme in the random oracle model based on the assumed hardness of either of these problems. We define and prove analogous results for ``one-more-discrete-logarithm'' problems. Since the appearence of the preliminary version of this paper, the new problems we have introduced have found other uses as well.",
  issn="1432-1378",
  doi="10.1007/s00145-002-0120-1",
  doi_url="http://dx.doi.org/10.1007/s00145-002-0120-1",
  url="https://eprint.iacr.org/2001/002"
}


@inbook{RSA-HDF-KTIvCTI,
  author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
  editor="Syverson, Paul",
  chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
  title="Financial Cryptography: 5th International Conference",
  year="2002",
  publisher="Springer",
  address="Berlin, Heidelberg",
  pages="319--338",
  isbn="978-3-540-46088-6",
  doi="10.1007/3-540-46088-8_25",
  url="https://www.di.ens.fr/~pointche/Documents/Papers/2001_fcA.pdf"
}


@inbook{Coron2000,
  author="Coron, Jean-S{\'e}bastien",
  editor="Bellare, Mihir",
  chapter="On the Exact Security of Full Domain Hash",
  title="Advances in Cryptology --- CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20--24, 2000 Proceedings",
  year="2000",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="229--235",
  isbn="978-3-540-44598-2",
  doi="10.1007/3-540-44598-6_14",
  doi_url="http://dx.doi.org/10.1007/3-540-44598-6_14",
  url="https://www.iacr.org/archive/crypto2000/18800229/18800229.pdf"
}