@inproceedings{a527e9dd0c7042a0be89031ef61bf8d0,
title = "A practical approach defeating blackmailing",
abstract = "To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently K{\"u}gler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.",
author = "Han, {Dong Guk} and Park, {Hye Young} and Park, {Young Ho} and Sangjin Lee and Lee, {Dong Hoon} and Yang, {Hyung Jin}",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 2002.; 7th Australasian Conference on Information Security and Privacy, ACISP 2002 ; Conference date: 03-07-2002 Through 05-07-2002",
year = "2002",
doi = "10.1007/3-540-45450-0_35",
language = "English",
isbn = "3540438610",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "464--481",
editor = "Lynn Batten and Jennifer Seberry",
booktitle = "Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings",
}