Distributed Double Spending Prevention

We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (e.g., in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several solutions that do achieve a reasonable level of double spending prevention, and analyse their efficiency under varying assumptions.

[1]  Stanislaw Jarecki,et al.  An Efficient Micropayment System Based on Probabilistic Polling , 1997, Financial Cryptography.

[2]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[3]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[4]  Paul M. B. Vitányi,et al.  Distributed match-making , 1988, Algorithmica.

[5]  Emin Gün Sirer,et al.  KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .

[6]  P. Erdös,et al.  Families of finite sets in which no set is covered by the union ofr others , 1985 .

[7]  Flavio D. Garcia,et al.  Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications , 2005, ACNS.

[8]  Philippe A. Janson,et al.  The State of the Art in Electronic Payment Systems , 1997, Computer.

[9]  Hector Garcia-Molina,et al.  PPay: micropayments for peer-to-peer systems , 2003, CCS '03.

[10]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[11]  Avishai Wool,et al.  Probabilistic Quorum Systems , 2001, Inf. Comput..

[12]  Ahmad-Reza Sadeghi,et al.  Electronic Payment Systems , 2003, Digital Rights Management.

[13]  Yacov Yacobi Risk Management for E-Cash Systems with Partial Real-Time Audit , 1999, Financial Cryptography.

[14]  Shane Hird Technical Solutions for Controlling Spam , 2002 .

[15]  Yacov Yacobi Risk Management for E-Cash Systems with Partial Real-Time Audit , 2001 .

[16]  David Wheeler,et al.  Transactions Using Bets , 1996, Security Protocols Workshop.

[17]  Adam Shostack,et al.  Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards , 1999, Smartcard.

[18]  Sergei Izmalkov,et al.  Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).