A practical approach defeating blackmailing

Dong Guk Han, Hye Young Park, Young Ho Park, Sangjin Lee, Dong Hoon Lee, Hyung Jin Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution


To simulate the functionalities of the real cash, one of the important requirements of electronic cash systems is the anonymity of users. Unconditional anonymity, however, is also very well suited to support criminals in blackmailing. Recently Kügler and Vogt [6] proposed a payment system based on the blind undeniable signature that protects the privacy of the users and defeats blackmailing with the assumption that the victim of a blackmailing can inform the Bank of a blackmailing before delivering the money and transfer the decryption key(i.e. the secret key of the victim) used in confirmation protocol without being detected by a blackmailer. But the assumption that the victim is always able to inform the bank of blackmailing is very impractical in such cases as kidnapping and special impersonation. In this paper, we propose two practical methods that gives the Bank the information about blackmailing and decryption key without any unpractical assumptions.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings
EditorsLynn Batten, Jennifer Seberry
PublisherSpringer Verlag
Number of pages18
ISBN (Print)3540438610, 9783540438618
Publication statusPublished - 2002
Event7th Australasian Conference on Information Security and Privacy, ACISP 2002 - Melbourne, Australia
Duration: 2002 Jul 32002 Jul 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other7th Australasian Conference on Information Security and Privacy, ACISP 2002

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2002.

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'A practical approach defeating blackmailing'. Together they form a unique fingerprint.

Cite this