{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:45Z","timestamp":1754157225267,"version":"3.41.2"},"reference-count":8,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2006,3,1]],"date-time":"2006-03-01T00:00:00Z","timestamp":1141171200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,3,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To enhance security and privacy of e\u2010cash systems that apply revocable anonymity by presenting a statistical attack that reveals the hidden ID and suitable protection means against this kind of attack.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The feasibility of a statistical attack that reveals the ID of user of e\u2010cash schemes with revocable anonymity is shown. To avoid such attacks the application of modulo operations while constructing e\u2010cash coins is proposed. Measurement results are used to back up the suitability of this approach.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Revocable anonymity systems can successfully be attacked. Applying modulo operations can prevent such attacks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The recommendations given in this paper should be applied whenever an e\u2010cash scheme or similar system with revocable anonymity is designed. Otherwise the promised feature may be compromised very easily.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper identifies a formerly unknown attack against systems with revocable identities, and presents a mathematical solution to protect such systems against the attack presented.<\/jats:p><\/jats:sec>","DOI":"10.1108\/10662240610656492","type":"journal-article","created":{"date-parts":[[2006,7,3]],"date-time":"2006-07-03T23:51:17Z","timestamp":1151970677000},"page":"159-169","source":"Crossref","is-referenced-by-count":0,"title":["Protecting privacy in e\u2010cash schemes by securing hidden identity approaches against statistical attacks"],"prefix":"10.1108","volume":"16","author":[{"given":"Krzysztof","family":"Piotrowski","sequence":"first","affiliation":[]},{"given":"Peter","family":"Langend\u00f6rfer","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Maye","sequence":"additional","affiliation":[]},{"given":"Zoya","family":"Dyka","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022022020235921200_b1","doi-asserted-by":"crossref","unstructured":"Brands, S. (1994), \u201cUntraceable off\u2010line cash in wallets with observers\u201d, in Stinson, D.R. (Ed.), Proceedings of Crypto '93, Lecture Notes in Computer Science, Vol. 773, Springer\u2010Verlag, Berlin, pp. 302\u201018.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"key2022022020235921200_b2","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1983), Blind signatures for untraceable payments, in Chaum, D., Rivest, R.L., Sherman, A.T. (Eds.), Advances in Cryptology, Proceedings of Crypto 82, Plenum Press, New York, NY, pp. 199\u2010203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"key2022022020235921200_b3","doi-asserted-by":"crossref","unstructured":"Cranor, L.F. (2000), \u201cBeyond concern: understanding net users' attitudes about online privacy\u201d, in Vogelsang, I. and Compaine, B.M. (Eds), The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy, The MIT Press, Cambridge, MA, pp. 47\u201070.","DOI":"10.7551\/mitpress\/3874.003.0008"},{"key":"key2022022020235921200_b4","unstructured":"Langend\u00f6rfer, P. (2002), \u201cM\u2010commerce: why it does not fly (yet?)\u201d, Proceedings of the International Conference on Advances in Infrastructure for E\u2010business, E\u2010education, E\u2010science and E\u2010medicine on the Internet, L'Aquila."},{"key":"key2022022020235921200_b5","unstructured":"National Institute of Standards and Technology (NIST) (2000), Digital Signature Standard, FIPS PUB 186\u20102, Federal Information Processing Standards Publication, available at: http:\/\/csrc.nist.gov\/publications\/fips\/fips186\u20102\/fips186\u20102\u2010change1.pdf (accessed 4 October 2005)."},{"key":"key2022022020235921200_b6","unstructured":"Petersen, H. and Poupard, G. (1997), Efficient Scalable Fair Cash with Off\u2010line Extortion Prevention\u201d, Technical Report LIENS\u201097\u20107, Ecole Normale Superieure, available at: http:\/\/citeseer.ist.psu.edu\/petersen97efficient.html (accessed 4 October 2005)."},{"key":"key2022022020235921200_b7","unstructured":"Piotrowski, K., Langend\u00f6rfer, P., Maye, O. and Dyka, Z. (2004), \u201cEnsuring anonymity in e\u2010commerce systems using a hidden identity approach: discussion of problems and solutions\u201d, Proceedings of The Seventh International Conference on Electronic Commerce Research, Dallas, TX."},{"key":"key2022022020235921200_b8","unstructured":"Saunders, Ch. (2001), Study: Web Privacy Concerns Cost $3.4 Billion, available at: www.clickz.com\/news\/article.php\/920201 (accessed 4 October 2005)."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240610656492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240610656492\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240610656492\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:07Z","timestamp":1753400407000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/16\/2\/159-169\/181244"}},"subtitle":[],"editor":[{"given":"Stefanos","family":"Gritzalis","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2006,3,1]]},"references-count":8,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,3,1]]}},"alternative-id":["10.1108\/10662240610656492"],"URL":"https:\/\/doi.org\/10.1108\/10662240610656492","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2006,3,1]]}}}