exchange/doc/paper/taler.bib
Christian Grothoff 0e808b648a
fix misc typos
2020-07-22 23:56:52 +02:00

453 lines
16 KiB
BibTeX

@article{nakamoto2008bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Nakamoto, Satoshi},
year={2008}
}
@inproceedings{ BDL+11,
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
title = {High-speed high-security signatures},
booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2011}},
editor = {Bart Preneel and Tsuyoshi Takagi},
series = {Lecture Notes in Computer Science},
publisher = {Springer-Verlag Berlin Heidelberg},
volume = {6917},
year = {2011},
pages = {124--142},
}
@article{eddsa,
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
title = {High-speed high-security signatures},
journal = {Journal of Cryptographic Engineering},
publisher = {Springer-Verlag Berlin Heidelberg},
volume = {2},
number = {2},
year = {2012},
pages = {77--89},
}
@misc{cryptoeprint:2015:677,
author = {Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
title = {EdDSA for more curves},
howpublished = {Cryptology ePrint Archive, Report 2015/677},
year = {2015},
note = {\url{http://eprint.iacr.org/2015/677}},
}
@InProceedings{apod,
author = {Elli Androulaki and Steven Bellovin},
title = {APOD: Anonymous Physical Object Delivery},
booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)},
year = {2009},
}
@Article{blum1981,
author = {Manuel Blum},
title = {Coin Flipping by Telephone},
journal = {CRYPTO},
year = {1981},
pages = {11-15},
}
@misc{BOLT,
author = {Matthew Green and Ian Miers},
title = {Bolt: Anonymous Payment Channels for Decentralized Currencies},
howpublished = {Cryptology ePrint Archive, Report 2016/701},
year = {2016},
note = {\url{http://eprint.iacr.org/2016/701}},
}
@misc{LightningNetwork,
author = {Joseph Poon and Thaddeus Dryja},
title = {The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments},
month = {January},
year = {2016},
note = {\url{https://lightning.network/lightning-network-paper.pdf}},
}
@misc{RippleFined:FinCEN,
author = {Steve Hudak},
title = {FinCEN Fines Ripple Labs Inc. in First Civil Enforcement Action Against a Virtual Currency Exchanger},
month = {May},
day = {5},
year = {2015},
note = {\url{https://www.fincen.gov/news/news-releases/fincen-fines-ripple-labs-inc-first-civil-enforcement-action-against-virtual}},
}
@misc{RippleFined:ArsTechnica,
author = {Megan Geuss},
title = {Cryptocurrency maker Ripple Labs fined \$700K for flouting financial regs. Virtual currency Wild West is done, registration as a Money Services Business required.},
month = {May},
day = {5},
year = {2015},
note = {\url{https://arstechnica.com/tech-policy/2015/05/cryptocurrency-maker-ripple-labs-fined-700k-for-flouting-financial-regs/}},
url_coindesk = {http://www.coindesk.com/fincen-fines-ripple-labs-700000-bank-secrecy-act/}
}
@misc{RippleFined:CoinDesk,
author = {Stan Higgins},
title = {FinCEN Fines Ripple Labs for Bank Secrecy Act Violations},
month = {May},
day = {5},
year = {2015},
note = {\url{http://www.coindesk.com/fincen-fines-ripple-labs-700000-bank-secrecy-act/}},
}
@inproceedings{danezis2016rscoin,
author = {George Danezis and
Sarah Meiklejohn},
title = {Centrally Banked Cryptocurrencies},
booktitle = {23nd Annual Network and Distributed System Security Symposium, {NDSS}
2016, San Diego, California, USA, February 21-24, 2016},
year = {2016},
publisher = {The Internet Society},
}
@Misc{greece2015cash,
author = {Reuters},
title = {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday},
howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}},
month = {June},
year = {2015},
}
@Misc{france2015cash,
author = {Heinz-Peter Bader},
title = {France steps up monitoring of cash payments to fight low-cost terrorism},
howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}},
month = {Mar},
year = {2015},
}
@Misc{fatf1997,
title = {FATF-IX report on money laundering typologies},
howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}},
month = {feb},
year = {1998},
}
@InProceedings{sander1999escrow,
author = {Tomas Sander and Amnon Ta-Shma},
title = {On Anonymous Electronic Cash and Crime},
booktitle = {ISW'99},
year = {1999},
series = {LNCS 1729},
pages = {202--206},
}
@Article{solms1992perfect,
author = {Sebastiaan H. von Solms and David Naccache},
title = {On blind signatures and perfect crimes},
journal = {Computers \& Security},
year = {1992},
volume = {11},
number = {6},
pages = {581--583},
}
@unpublished{cryptonote,
author = {van Saberhagen, Nicolas},
month = oct,
posted-at = {2016-09-18 11:44:05},
priority = {2},
title = {{CryptoNote v 2.0}},
url = {https://cryptonote.org/whitepaper.pdf},
year = {2013}
}
@inproceedings{chaum1990untraceable,
title={Untraceable electronic cash},
author={Chaum, David and Fiat, Amos and Naor, Moni},
booktitle={Proceedings on Advances in cryptology},
pages={319--327},
year={1990},
organization={Springer-Verlag New York, Inc.}
}
@inproceedings{chaum1983blind,
title={Blind signatures for untraceable payments},
author={Chaum, David},
booktitle={Advances in cryptology},
pages={199--203},
year={1983},
organization={Springer}
}
@inproceedings{rivest2004peppercoin,
title={Peppercoin micropayments},
author={Rivest, Ronald L},
booktitle={Financial Cryptography},
pages={2--8},
year={2004},
organization={Springer}
}
@inproceedings{Camenisch05compacte-cash,
author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya},
title = {Compact e-cash},
booktitle = {In EUROCRYPT, volume 3494 of LNCS},
year = {2005},
pages = {302--321},
publisher = {Springer-Verlag},
url = {http://cs.brown.edu/~anna/papers/chl05-full.pdf},
url_citeseerx = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.4640}
}
@Inbook{ST99,
author="Sander, Tomas and Ta-Shma, Amnon",
editor="Wiener, Michael",
title="Auditable, Anonymous Electronic Cash",
bookTitle="Advances in Cryptology --- CRYPTO' 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15--19, 1999 Proceedings",
year="1999",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="555--572",
isbn="978-3-540-48405-9",
doi="10.1007/3-540-48405-1_35",
doi_url="http://dx.doi.org/10.1007/3-540-48405-1_35",
url = {http://www.cs.tau.ac.il/~amnon/Papers/ST.crypto99.pdf"}
}
@inproceedings{zerocash,
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
title = {Zerocash: Decentralized Anonymous Payments from Bitcoin},
booktitle = {IEEE Symposium on Security \& Privacy},
year = {2014},
}
@inproceedings{miers2013zerocoin,
title={Zerocoin: Anonymous distributed e-cash from bitcoin},
author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
pages={397--411},
year={2013},
organization={IEEE}
}
@Inbook{AccountableZerocash,
author="Garman, Christina and Green, Matthew and Miers, Ian",
editor="Grossklags, Jens and Preneel, Bart",
title="Accountable Privacy for Decentralized Anonymous Payments",
bookTitle="Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised Selected Papers",
year="2017",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="81--98",
isbn="978-3-662-54970-4",
doi="10.1007/978-3-662-54970-4_5",
doi_url="http://dx.doi.org/10.1007/978-3-662-54970-4_5",
url = {http://eprint.iacr.org/2016/061}
}
@InProceedings{fc2014murdoch,
author = {Stephen Murdoch and Ross Anderson},
title = {Security Protocols and Evidence: Where Many Payment Systems Fail},
booktitle = {Financial Cryptography and Data Security},
year = {2014},
}
@book{engels1844,
author = "Friedrich Engels",
title = "{Umrisse zu einer Kritik der National\"okonomie}",
year = "1844",
publisher = "Ruge and Marx, Paris",
}
@inproceedings{selby2004analyzing,
title={Analyzing the Success and Failure of Recent e-Payment Schemes},
author={Selby, Jack R},
booktitle={Financial Cryptography},
pages={1--1},
year={2004},
organization={Springer}
}
@misc{brands1993efficient,
title={An efficient off-line electronic cash system based on the representation problem},
author={Brands, Stefan A},
year={1993},
publisher={Centrum voor Wiskunde en Informatica}
}
@article{dent2008extensions,
title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements},
author={Dent, AW and Paterson, KG and Wild, PR},
year={2008}
}
@article{dent2008preliminary,
title={Preliminary Report on Chaum's Online E-Cash Architecture},
author={Dent, AW and Paterson, KG and Wild, PR},
journal={Royal Holloway, University of London},
year={2008}
}
@inproceedings{tor-design,
title = {Tor: The Second-Generation Onion Router},
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
booktitle = {Proceedings of the 13th USENIX Security Symposium},
year = {2004},
month = {August},
www_important = {1},
www_tags = {selected},
www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html},
www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf},
www_section = {Anonymous communication},
}
@inbook{BellareRogaway1996,
author="Bellare, Mihir and Rogaway, Phillip",
editor="Maurer, Ueli",
chapter="The Exact Security of Digital Signatures-How to Sign with RSA and Rabin",
title="Advances in Cryptology --- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12--16, 1996 Proceedings",
year="1996",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="399--416",
isbn="978-3-540-68339-1",
doi="10.1007/3-540-68339-9_34",
url_doi="http://dx.doi.org/10.1007/3-540-68339-9_34",
url="http://web.cs.ucdavis.edu/~rogaway/papers/exact.pdf"
}
@article{martens2015practical,
title={Practical Divisible E-Cash.},
author={M{\"a}rtens, Patrick},
journal={IACR Cryptology ePrint Archive},
volume={2015},
pages={318},
year={2015}
}
@misc{Martens2015,
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
author = {Patrick M{\"a}rtens},
howpublished = {IACR Cryptology ePrint Archive 2015/086},
year = {2015},
note = {\url{http://eprint.iacr.org/2015/086}},
}
@misc{CPST-DivisibleMadePractical,
author = {Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré},
title = {Divisible E-Cash Made Practical},
howpublished = {Cryptology ePrint Archive, Report 2014/785},
year = {2014},
note = {\url{http://eprint.iacr.org/2014/785}},
}
@Inbook{CPST-CutDownTheTree,
author="Pointcheval, David and Sanders, Olivier and Traor{\'e}, Jacques",
editor="Fehr, Serge",
title="Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash",
bookTitle="Public-Key Cryptography -- PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I",
year="2017",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="61--90",
isbn="978-3-662-54365-8",
doi="10.1007/978-3-662-54365-8_4",
doi_url="https://doi.org/10.1007/978-3-662-54365-8_4"
note = {Cryptology ePrint Archive, Report 2015/972 \url{http://eprint.iacr.org/2015/972}},
url = {http://eprint.iacr.org/2015/972},
}
@book{molander1998cyberpayments,
title={Cyberpayments and money laundering: Problems and promise},
author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A},
volume={965},
year={1998},
publisher={Rand Corporation}
}
@inproceedings{rupp2013p4r,
title={P4R: Privacy-preserving pre-payments with refunds for transportation systems},
author={Rupp, Andy and Hinterw{\"a}lder, Gesine and Baldimtsi, Foteini and Paar, Christof},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={205--212},
year={2013},
organization={Springer}
}
@article{Pointcheval_n_Stern,
author="Pointcheval, David and Stern, Jacques",
title="Security Arguments for Digital Signatures and Blind Signatures ",
journal="Journal of Cryptology",
year="2000",
month="Jun",
day="01",
volume="13",
number="3",
pages="361--396",
abstract="Since the appearance of public-key cryptography in the seminal Diffie---Hellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for several years is often considered as a kind of validation procedure. A much more convincing line of research has tried to provide ``provable'' security for cryptographic protocols. Unfortunately, in many cases, provable security is at the cost of a considerable loss in terms of efficiency. Another way to achieve some kind of provable security is to identify concrete cryptographic objects, such as hash functions, with ideal random objects and to use arguments from relativized complexity theory. The model underlying this approach is often called the ``random oracle model.'' We use the word ``arguments'' for security results proved in this model. As usual, these arguments are relative to well-established hard algorithmic problems such as factorization or the discrete logarithm.",
issn="1432-1378",
doi="10.1007/s001450010003",
url="https://doi.org/10.1007/s001450010003"
}
@article{OneMoreInversion,
author="Bellare and Namprempre and Pointcheval and Semanko",
title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
journal="Journal of Cryptology",
volume="16",
number="3",
pages="185--215",
abstract="We introduce a new class of computational problems which we call the ``one-more-RSA-inversion'' problems. Our main result is that two problems in this class, which we call the chosen-target and known-target inversion problems, respectively, have polynomially equivalent computational complexity. We show how this leads to a proof of security for Chaum's RSA-based blind signature scheme in the random oracle model based on the assumed hardness of either of these problems. We define and prove analogous results for ``one-more-discrete-logarithm'' problems. Since the appearance of the preliminary version of this paper, the new problems we have introduced have found other uses as well.",
issn="1432-1378",
doi="10.1007/s00145-002-0120-1",
doi_url="http://dx.doi.org/10.1007/s00145-002-0120-1",
url="https://eprint.iacr.org/2001/002"
}
@inbook{RSA-FDH-KTIvCTI,
author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
editor="Syverson, Paul",
chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
title="Financial Cryptography: 5th International Conference",
year="2002",
publisher="Springer",
address="Berlin, Heidelberg",
pages="319--338",
isbn="978-3-540-46088-6",
doi="10.1007/3-540-46088-8_25",
url="https://www.di.ens.fr/~pointche/Documents/Papers/2001_fcA.pdf"
}
@inbook{Coron2000,
author="Coron, Jean-S{\'e}bastien",
editor="Bellare, Mihir",
chapter="On the Exact Security of Full Domain Hash",
title="Advances in Cryptology --- CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20--24, 2000 Proceedings",
year="2000",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="229--235",
isbn="978-3-540-44598-2",
doi="10.1007/3-540-44598-6_14",
doi_url="http://dx.doi.org/10.1007/3-540-44598-6_14",
url="https://www.iacr.org/archive/crypto2000/18800229/18800229.pdf"
}