Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Information Security and Computer Fraud. 2015, 3(1), 15-24
DOI: 10.12691/iscf-3-1-3
Open AccessArticle

Development of Self-Issuable (Divisible and Transferable) Offline Electronic Cash

Shinsuke Tamura1, and Hazim A. Haddad1

1School of Engineering, University of Fukui, Fukui, Japan

Pub. Date: August 23, 2015

Cite this paper:
Shinsuke Tamura and Hazim A. Haddad. Development of Self-Issuable (Divisible and Transferable) Offline Electronic Cash. Information Security and Computer Fraud. 2015; 3(1):15-24. doi: 10.12691/iscf-3-1-3


Based on anonymous tag based credentials and linear Mix-nets, this paper develops a scheme for e-cash systems that can be used in offline environments. The developed scheme makes e-cash holders anonymous while disabling them to use e-cash dishonestly. It also makes e-cash divisible and transferable. In detail, although no one except cash holders themselves can know correspondences between them and their e-cash, e-cash issuing authority can identify dishonest cash holders that had generated and/or spent e-cash illegitimately. In addition, cash holders can generate new e-cash of arbitrary values from their holding e-cash to make purchases of amounts less than original cash values. Also, cash holders can use e-cash that they had received from others as same as the one directly issued to them from the issuing authority.

privacy anonymous tags anonymous credentials linear mix-nets

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit


Figure of 4


[1]  T. Okamoto, “An efficient divisible electronic cash scheme,” Crypto’95, 438-451. 1995.
[2]  J. Camenisch, S. Hohenberger and A. Lysyanskaya, “Compact e-cash,” Eurocrypt’05, 302-321. 2005.
[3]  S. Canard and A. Gouget, Divisible e-cash systems can be truly anonymous,” Eurocrypt’07, 482-497. 2007.
[4]  S. Canard, A. Gouget and J. Traore, Improvement of efficiency in (unconditional) anonymous transferable e-cash,” Financial Cryptography 2008, 202-214. 2008.
[5]  G. Fuchsbauer, D. Pointcheval and D. Vergnaud, “Transferable constant-size fair e-cash,” Proceedings of the 8th International Conference on Cryptology and Network Security, 226-247. 2009.
[6]  S. Canard and A. Gouget, Multiple denominations in e-cash with compact transaction data,” Financial Cryptography 2010, 82-97. 2010.
[7]  M. Izabachene and B, Libert, “Divisible e-cash in the standard model,” Pairing'12, 314-332. 2012.
[8]  S. Tamura, “Anonymous Security Systems and Applications: Requirements and Solutions,” Information Science Reference, 2012.
[9]  S. Tamura and S. Taniguchi, “Enhancement of anonymous tag based credentials,” Information Security and Computer Fraud, Vol. 2, No. 1, 10-20, 2014.
[10]  S. Tamura and S. Taniguchi, “Linear mix-net and a scheme for collecting data from anonymous data holders,” Information Security and Computer Fraud, Vol. 2, No. 3, 39-47, 2014.
[11]  S. Tamura, “Elements of Schemes for Preserving Privacies in e-society Systems,” Lambert Academic Publishing, 2015.