435 lines
15 KiB
BibTeX
435 lines
15 KiB
BibTeX
@article{nakamoto2008bitcoin,
|
|
title={Bitcoin: A peer-to-peer electronic cash system},
|
|
author={Nakamoto, Satoshi},
|
|
year={2008}
|
|
}
|
|
|
|
@inproceedings{ BDL+11,
|
|
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
|
|
title = {High-speed high-security signatures},
|
|
booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2011}},
|
|
editor = {Bart Preneel and Tsuyoshi Takagi},
|
|
series = {Lecture Notes in Computer Science},
|
|
publisher = {Springer-Verlag Berlin Heidelberg},
|
|
volume = {6917},
|
|
year = {2011},
|
|
pages = {124--142},
|
|
}
|
|
|
|
@article{eddsa,
|
|
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
|
|
title = {High-speed high-security signatures},
|
|
journal = {Journal of Cryptographic Engineering},
|
|
publisher = {Springer-Verlag Berlin Heidelberg},
|
|
volume = {2},
|
|
number = {2},
|
|
year = {2012},
|
|
pages = {77--89},
|
|
}
|
|
|
|
@misc{cryptoeprint:2015:677,
|
|
author = {Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
|
|
title = {EdDSA for more curves},
|
|
howpublished = {Cryptology ePrint Archive, Report 2015/677},
|
|
year = {2015},
|
|
note = {\url{http://eprint.iacr.org/2015/677}},
|
|
}
|
|
|
|
@InProceedings{apod,
|
|
author = {Elli Androulaki and Steven Bellovin},
|
|
title = {APOD: Anonymous Physical Object Delivery},
|
|
booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)},
|
|
year = {2009},
|
|
}
|
|
|
|
@Article{blum1981,
|
|
author = {Manuel Blum},
|
|
title = {Coin Flipping by Telephone},
|
|
journal = {CRYPTO},
|
|
year = {1981},
|
|
pages = {11-15},
|
|
}
|
|
|
|
|
|
@misc{BOLT,
|
|
author = {Matthew Green and Ian Miers},
|
|
title = {Bolt: Anonymous Payment Channels for Decentralized Currencies},
|
|
howpublished = {Cryptology ePrint Archive, Report 2016/701},
|
|
year = {2016},
|
|
note = {\url{http://eprint.iacr.org/2016/701}},
|
|
}
|
|
|
|
@misc{LightningNetwork,
|
|
author = {Joseph Poon and Thaddeus Dryja},
|
|
title = {The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments},
|
|
month = {January},
|
|
year = {2016},
|
|
note = {\url{https://lightning.network/lightning-network-paper.pdf}},
|
|
}
|
|
|
|
|
|
@misc{RippleFined:FinCEN,
|
|
author = {Steve Hudak},
|
|
title = {FinCEN Fines Ripple Labs Inc. in First Civil Enforcement Action Against a Virtual Currency Exchanger},
|
|
month = {May},
|
|
day = {5},
|
|
year = {2015},
|
|
note = {\url{https://www.fincen.gov/news/news-releases/fincen-fines-ripple-labs-inc-first-civil-enforcement-action-against-virtual}},
|
|
}
|
|
|
|
@misc{RippleFined:ArsTechnica,
|
|
author = {Megan Geuss},
|
|
title = {Cryptocurrency maker Ripple Labs fined \$700K for flouting financial regs. Virtual currency Wild West is done, registration as a Money Services Business required.},
|
|
month = {May},
|
|
day = {5},
|
|
year = {2015},
|
|
note = {\url{https://arstechnica.com/tech-policy/2015/05/cryptocurrency-maker-ripple-labs-fined-700k-for-flouting-financial-regs/}},
|
|
url_coindesk = {http://www.coindesk.com/fincen-fines-ripple-labs-700000-bank-secrecy-act/}
|
|
}
|
|
|
|
@misc{RippleFined:CoinDesk,
|
|
author = {Stan Higgins},
|
|
title = {FinCEN Fines Ripple Labs for Bank Secrecy Act Violations},
|
|
month = {May},
|
|
day = {5},
|
|
year = {2015},
|
|
note = {\url{http://www.coindesk.com/fincen-fines-ripple-labs-700000-bank-secrecy-act/}},
|
|
}
|
|
|
|
|
|
@inproceedings{danezis2016rscoin,
|
|
author = {George Danezis and
|
|
Sarah Meiklejohn},
|
|
title = {Centrally Banked Cryptocurrencies},
|
|
booktitle = {23nd Annual Network and Distributed System Security Symposium, {NDSS}
|
|
2016, San Diego, California, USA, February 21-24, 2016},
|
|
year = {2016},
|
|
publisher = {The Internet Society},
|
|
}
|
|
|
|
@Misc{greece2015cash,
|
|
author = {Reuters},
|
|
title = {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday},
|
|
howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}},
|
|
month = {June},
|
|
year = {2015},
|
|
}
|
|
|
|
@Misc{france2015cash,
|
|
author = {Heinz-Peter Bader},
|
|
title = {France steps up monitoring of cash payments to fight low-cost terrorism},
|
|
howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}},
|
|
month = {Mar},
|
|
year = {2015},
|
|
}
|
|
|
|
|
|
@Misc{fatf1997,
|
|
title = {FATF-IX report on money laundering typologies},
|
|
howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}},
|
|
month = {feb},
|
|
year = {1998},
|
|
}
|
|
|
|
@InProceedings{sander1999escrow,
|
|
author = {Tomas Sander and Amnon Ta-Shma},
|
|
title = {On Anonymous Electronic Cash and Crime},
|
|
booktitle = {ISW'99},
|
|
year = {1999},
|
|
series = {LNCS 1729},
|
|
pages = {202--206},
|
|
}
|
|
|
|
@Article{solms1992perfect,
|
|
author = {Sebastiaan H. von Solms and David Naccache},
|
|
title = {On blind signatures and perfect crimes},
|
|
journal = {Computers \& Security},
|
|
year = {1992},
|
|
volume = {11},
|
|
number = {6},
|
|
pages = {581--583},
|
|
}
|
|
|
|
@unpublished{cryptonote,
|
|
author = {van Saberhagen, Nicolas},
|
|
month = oct,
|
|
posted-at = {2016-09-18 11:44:05},
|
|
priority = {2},
|
|
title = {{CryptoNote v 2.0}},
|
|
url = {https://cryptonote.org/whitepaper.pdf},
|
|
year = {2013}
|
|
}
|
|
|
|
@inproceedings{chaum1990untraceable,
|
|
title={Untraceable electronic cash},
|
|
author={Chaum, David and Fiat, Amos and Naor, Moni},
|
|
booktitle={Proceedings on Advances in cryptology},
|
|
pages={319--327},
|
|
year={1990},
|
|
organization={Springer-Verlag New York, Inc.}
|
|
}
|
|
|
|
@inproceedings{chaum1983blind,
|
|
title={Blind signatures for untraceable payments},
|
|
author={Chaum, David},
|
|
booktitle={Advances in cryptology},
|
|
pages={199--203},
|
|
year={1983},
|
|
organization={Springer}
|
|
}
|
|
|
|
@inproceedings{rivest2004peppercoin,
|
|
title={Peppercoin micropayments},
|
|
author={Rivest, Ronald L},
|
|
booktitle={Financial Cryptography},
|
|
pages={2--8},
|
|
year={2004},
|
|
organization={Springer}
|
|
}
|
|
|
|
|
|
@inproceedings{Camenisch05compacte-cash,
|
|
author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya},
|
|
title = {Compact e-cash},
|
|
booktitle = {In EUROCRYPT, volume 3494 of LNCS},
|
|
year = {2005},
|
|
pages = {302--321},
|
|
publisher = {Springer-Verlag},
|
|
url = {http://cs.brown.edu/~anna/papers/chl05-full.pdf},
|
|
url_citeseerx = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.4640}
|
|
}
|
|
|
|
|
|
@Inbook{ST99,
|
|
author="Sander, Tomas and Ta-Shma, Amnon",
|
|
editor="Wiener, Michael",
|
|
title="Auditable, Anonymous Electronic Cash",
|
|
bookTitle="Advances in Cryptology --- CRYPTO' 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15--19, 1999 Proceedings",
|
|
year="1999",
|
|
publisher="Springer Berlin Heidelberg",
|
|
address="Berlin, Heidelberg",
|
|
pages="555--572",
|
|
isbn="978-3-540-48405-9",
|
|
doi="10.1007/3-540-48405-1_35",
|
|
doi_url="http://dx.doi.org/10.1007/3-540-48405-1_35",
|
|
url = {http://www.cs.tau.ac.il/~amnon/Papers/ST.crypto99.pdf"}
|
|
}
|
|
|
|
|
|
|
|
@inproceedings{zerocash,
|
|
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
|
|
title = {Zerocash: Decentralized Anonymous Payments from Bitcoin},
|
|
booktitle = {IEEE Symposium on Security \& Privacy},
|
|
year = {2014},
|
|
}
|
|
|
|
@inproceedings{miers2013zerocoin,
|
|
title={Zerocoin: Anonymous distributed e-cash from bitcoin},
|
|
author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
|
|
booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
|
|
pages={397--411},
|
|
year={2013},
|
|
organization={IEEE}
|
|
}
|
|
|
|
|
|
|
|
|
|
@Inbook{AccountableZerocash,
|
|
author="Garman, Christina and Green, Matthew and Miers, Ian",
|
|
editor="Grossklags, Jens and Preneel, Bart",
|
|
title="Accountable Privacy for Decentralized Anonymous Payments",
|
|
bookTitle="Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised Selected Papers",
|
|
year="2017",
|
|
publisher="Springer Berlin Heidelberg",
|
|
address="Berlin, Heidelberg",
|
|
pages="81--98",
|
|
isbn="978-3-662-54970-4",
|
|
doi="10.1007/978-3-662-54970-4_5",
|
|
doi_url="http://dx.doi.org/10.1007/978-3-662-54970-4_5",
|
|
url = {http://eprint.iacr.org/2016/061}
|
|
}
|
|
|
|
|
|
@InProceedings{fc2014murdoch,
|
|
author = {Stephen Murdoch and Ross Anderson},
|
|
title = {Security Protocols and Evidence: Where Many Payment Systems Fail},
|
|
booktitle = {Financial Cryptography and Data Security},
|
|
year = {2014},
|
|
}
|
|
|
|
@book{engels1844,
|
|
author = "Friedrich Engels",
|
|
title = "{Umrisse zu einer Kritik der National\"okonomie}",
|
|
year = "1844",
|
|
publisher = "Ruge and Marx, Paris",
|
|
}
|
|
|
|
|
|
@inproceedings{selby2004analyzing,
|
|
title={Analyzing the Success and Failure of Recent e-Payment Schemes},
|
|
author={Selby, Jack R},
|
|
booktitle={Financial Cryptography},
|
|
pages={1--1},
|
|
year={2004},
|
|
organization={Springer}
|
|
}
|
|
|
|
@misc{brands1993efficient,
|
|
title={An efficient off-line electronic cash system based on the representation problem},
|
|
author={Brands, Stefan A},
|
|
year={1993},
|
|
publisher={Centrum voor Wiskunde en Informatica}
|
|
}
|
|
|
|
@article{dent2008extensions,
|
|
title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements},
|
|
author={Dent, AW and Paterson, KG and Wild, PR},
|
|
year={2008}
|
|
}
|
|
|
|
@article{dent2008preliminary,
|
|
title={Preliminary Report on Chaum's Online E-Cash Architecture},
|
|
author={Dent, AW and Paterson, KG and Wild, PR},
|
|
journal={Royal Holloway, University of London},
|
|
year={2008}
|
|
}
|
|
|
|
|
|
|
|
@inproceedings{tor-design,
|
|
title = {Tor: The Second-Generation Onion Router},
|
|
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
|
|
booktitle = {Proceedings of the 13th USENIX Security Symposium},
|
|
year = {2004},
|
|
month = {August},
|
|
www_important = {1},
|
|
www_tags = {selected},
|
|
www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html},
|
|
www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf},
|
|
www_section = {Anonymous communication},
|
|
}
|
|
|
|
|
|
@inbook{BellareRogaway1996,
|
|
author="Bellare, Mihir and Rogaway, Phillip",
|
|
editor="Maurer, Ueli",
|
|
chapter="The Exact Security of Digital Signatures-How to Sign with RSA and Rabin",
|
|
title="Advances in Cryptology --- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12--16, 1996 Proceedings",
|
|
year="1996",
|
|
publisher="Springer Berlin Heidelberg",
|
|
address="Berlin, Heidelberg",
|
|
pages="399--416",
|
|
isbn="978-3-540-68339-1",
|
|
doi="10.1007/3-540-68339-9_34",
|
|
url_doi="http://dx.doi.org/10.1007/3-540-68339-9_34",
|
|
url="http://web.cs.ucdavis.edu/~rogaway/papers/exact.pdf"
|
|
}
|
|
|
|
@article{martens2015practical,
|
|
title={Practical Divisible E-Cash.},
|
|
author={M{\"a}rtens, Patrick},
|
|
journal={IACR Cryptology ePrint Archive},
|
|
volume={2015},
|
|
pages={318},
|
|
year={2015}
|
|
}
|
|
|
|
@misc{Martens2015,
|
|
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
|
|
author = {Patrick M{\"a}rtens},
|
|
howpublished = {IACR Cryptology ePrint Archive 2015/086},
|
|
year = {2015},
|
|
note = {\url{http://eprint.iacr.org/2015/086}},
|
|
}
|
|
|
|
@misc{CPST-DivisibleMadePractical,
|
|
author = {Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré},
|
|
title = {Divisible E-Cash Made Practical},
|
|
howpublished = {Cryptology ePrint Archive, Report 2014/785},
|
|
year = {2014},
|
|
note = {\url{http://eprint.iacr.org/2014/785}},
|
|
}
|
|
|
|
@Inbook{CPST-CutDownTheTree,
|
|
author="Pointcheval, David and Sanders, Olivier and Traor{\'e}, Jacques",
|
|
editor="Fehr, Serge",
|
|
title="Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash",
|
|
bookTitle="Public-Key Cryptography -- PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I",
|
|
year="2017",
|
|
publisher="Springer Berlin Heidelberg",
|
|
address="Berlin, Heidelberg",
|
|
pages="61--90",
|
|
isbn="978-3-662-54365-8",
|
|
doi="10.1007/978-3-662-54365-8_4",
|
|
doi_url="https://doi.org/10.1007/978-3-662-54365-8_4"
|
|
note = {Cryptology ePrint Archive, Report 2015/972 \url{http://eprint.iacr.org/2015/972}},
|
|
url = {http://eprint.iacr.org/2015/972},
|
|
}
|
|
|
|
|
|
|
|
@book{molander1998cyberpayments,
|
|
title={Cyberpayments and money laundering: Problems and promise},
|
|
author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A},
|
|
volume={965},
|
|
year={1998},
|
|
publisher={Rand Corporation}
|
|
}
|
|
|
|
@inproceedings{rupp2013p4r,
|
|
title={P4R: Privacy-preserving pre-payments with refunds for transportation systems},
|
|
author={Rupp, Andy and Hinterw{\"a}lder, Gesine and Baldimtsi, Foteini and Paar, Christof},
|
|
booktitle={International Conference on Financial Cryptography and Data Security},
|
|
pages={205--212},
|
|
year={2013},
|
|
organization={Springer}
|
|
}
|
|
|
|
|
|
@article{OneMoreInversion,
|
|
author="Bellare and Namprempre and Pointcheval and Semanko",
|
|
title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
|
|
journal="Journal of Cryptology",
|
|
volume="16",
|
|
number="3",
|
|
pages="185--215",
|
|
abstract="We introduce a new class of computational problems which we call the ``one-more-RSA-inversion'' problems. Our main result is that two problems in this class, which we call the chosen-target and known-target inversion problems, respectively, have polynomially equivalent computational complexity. We show how this leads to a proof of security for Chaum's RSA-based blind signature scheme in the random oracle model based on the assumed hardness of either of these problems. We define and prove analogous results for ``one-more-discrete-logarithm'' problems. Since the appearence of the preliminary version of this paper, the new problems we have introduced have found other uses as well.",
|
|
issn="1432-1378",
|
|
doi="10.1007/s00145-002-0120-1",
|
|
doi_url="http://dx.doi.org/10.1007/s00145-002-0120-1",
|
|
url="https://eprint.iacr.org/2001/002"
|
|
}
|
|
|
|
|
|
@inbook{RSA-FDH-KTIvCTI,
|
|
author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
|
|
editor="Syverson, Paul",
|
|
chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
|
|
title="Financial Cryptography: 5th International Conference",
|
|
year="2002",
|
|
publisher="Springer",
|
|
address="Berlin, Heidelberg",
|
|
pages="319--338",
|
|
isbn="978-3-540-46088-6",
|
|
doi="10.1007/3-540-46088-8_25",
|
|
url="https://www.di.ens.fr/~pointche/Documents/Papers/2001_fcA.pdf"
|
|
}
|
|
|
|
|
|
@inbook{Coron2000,
|
|
author="Coron, Jean-S{\'e}bastien",
|
|
editor="Bellare, Mihir",
|
|
chapter="On the Exact Security of Full Domain Hash",
|
|
title="Advances in Cryptology --- CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20--24, 2000 Proceedings",
|
|
year="2000",
|
|
publisher="Springer Berlin Heidelberg",
|
|
address="Berlin, Heidelberg",
|
|
pages="229--235",
|
|
isbn="978-3-540-44598-2",
|
|
doi="10.1007/3-540-44598-6_14",
|
|
doi_url="http://dx.doi.org/10.1007/3-540-44598-6_14",
|
|
url="https://www.iacr.org/archive/crypto2000/18800229/18800229.pdf"
|
|
}
|