next up previous
Next: Purchase Up: Protocols Previous: Notation

Withdrawal and Exchange

 

The consumer generates a public key pair to use with each withdrawal. The public half of the pair is used to form tex2html_wrap_inline776 . The steps of the this protocol are given in Figure1.

 

    figure165


Figure 1: Token withdrawal protocol.

At the end of the protocol, the consumer can form the token tex2html_wrap_inline754 by unblinding tex2html_wrap_inline788 . The contents of tex2html_wrap_inline754 specify the public key Q (including modulus), whose private half is known only to C.

A token may be anonymously exchanged for a new token in a similar fashion by replacing the consumer's public key with the token's single-use key. The token exchange steps are given in Figure 2.

 

  figure181


Figure 2: Token exchange protocol.

The following is an example protocol using a specific blinding technique. The bank has an RSA public key pair with modulus tex2html_wrap_inline804 , public exponent 3, and private exponent tex2html_wrap_inline808 . The bank has also made public a cryptographic hash function h.

  1. C generates a desired public key pair Q,q with modulus tex2html_wrap_inline816
  2. C selects a random number tex2html_wrap_inline820
  3. 1. tex2html_wrap_inline822
  4. B computes tex2html_wrap_inline826
  5. 2. tex2html_wrap_inline828
  6. C computes tex2html_wrap_inline832 and then tex2html_wrap_inline834
  7. C has tex2html_wrap_inline838

The bank may use multiple signature keys for its blind signature, corresponding to different brands of tokens. The brand of a token determines its denomination and its withdrawal date. Having token brands is important for limiting the data logging requirements for the bank: until a brand of blinded token is withdrawn from use, the bank must maintain a database containing auditing information proving that expended tokens have been spent in order to prevent double spending (see Section 5). By a priori declaring that tokens will be worthless after the brand withdrawal date, the bank limits its data logging obligations; furthermore, brand withdrawal will also limit risk, since it limits the amount of time attackers will have to attack the key. Next, we discuss how the blind-signed token obtained above is used in the purchase protocol.


next up previous
Next: Purchase Up: Protocols Previous: Notation

TOM Comversion
Fri Oct 4 18:57:08 EDT 1996