skip to main content
10.1145/1655188.1655195acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

XPay: practical anonymous payments for tor routing and other networked services

Published:09 November 2009Publication History

ABSTRACT

We design and analyze the first practical anonymous payment mechanisms for network services. We start by reporting on our experience with the implementation of a routing micropayment solution for Tor. We then propose micropayment protocols of increasingly complex requirements for networked services, such as P2P or cloud-hosted services.

The solutions are efficient, with bandwidth and latency overheads of under 4% and 0.9 ms respectively (in ORPay for Tor), provide full anonymity (both for payers and payees), and support thousands of transactions per second.

References

  1. A.V. Aho, J.E. Hopcroft, and J.D. Ullman. The Design and Analysis of Computer Algorithms. Addison-Wesley, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Anderson, C. Manifavas, and C. Sutherland. NetCard: A practical electronic-cash system. Lecture Notes in Computer Science -- Security Protocols, 1189:49--57, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S.M. Bellovin. Par: Payment for anonymous routing. In N. Borisov and I. Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), pages 219==236, Leuven, Belgium, July 2008. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Brands. Untraceable off-line cash in wallets with observers (extended abstract). In CRYPTO, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact e-cash. In Ronald Cramer, editor, Advances in Cryptology -- Eurocrypt, volume 3494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Camenisch, A. Lysyanskaya, and M. Meyerovich. Endorsed e-cash. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Camenisch, U.M. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In ESORICS '96: Proceedings of the 4th European Symposium on Research in Computer Security, pages 33--43, London, UK, 1996. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology--Proceedings of Crypto '82, pages 199--203. Plenum Press, 1982.Google ScholarGoogle Scholar
  9. D. Chaum. Blind signatures system. Advances in Cryptology, Proceedings of CRYPTO, pages 153--156, 1983.Google ScholarGoogle Scholar
  10. D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030--1044, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Chaum. Privacy protected payments: Unconditional payer and/or payee untraceability. In Proceedings of SmartCard 2000, 1988.Google ScholarGoogle Scholar
  12. D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO '88: Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, pages 319--327, London, UK, 1990. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Chaum and T.P. Pedersen. Transferred cash grows in size. In EUROCRYPT, 1992.Google ScholarGoogle Scholar
  14. G.I. Davida, Y. Frankel, Y. Tsiounis, and M. Yung. Anonymity control in e-cash systems. In FC '97: Proceedings of the First International Conference on Financial Cryptography, pages 1--16, London, UK, 1997. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Frankel, Y. Tsiounis, and M. Yung. "indirect discourse proof": Achieving efficient fair off-line e-cash. In ASIACRYPT '96: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, pages 286--300, London, UK, 1996. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M.K. Franklin and M. Yung. Secure and efficient off-line digital money (extended abstract). In ICALP '93: Proceedings of the 20th International Colloquium on Automata, Languages and Programming, pages 265--276, London, UK, 1993. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. O. Goldreich. Foundations of Cryptography. Cambridge University Press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Hauser, M. Steiner, and M. Waidner. Micro-payments based on iKP. Technical report, 1996.Google ScholarGoogle Scholar
  20. A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. In CRYPTO '95: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pages 339--352, London, UK, 1995. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. iTunes Music Store. Online at http://www.apple.com/itunes.Google ScholarGoogle Scholar
  22. C. Jutla and M. Yung. Paytree: amortized-signature for flexible micropayments. In Second USENIX Workshop on Electronic Commerce, Oakland CA, Nov 1996.Google ScholarGoogle Scholar
  23. D.E. Knuth. Fundamental Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, Reading, Massachusetts, second edition, 10 Jan. 1973. This is a full INBOOK entry.Google ScholarGoogle Scholar
  24. R.J. Lipton and R. Ostrovsky. Micro-payments via efficient coin-flipping. In Financial Cryptography, pages 1--15. Springer-Verlag, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Lysyanskaya and C. Peikert. Adaptive security in the threshold setting: From cryptosystems to signature schemes. In ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, pages 331--350, London, UK, 2001. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M.S. Manasse. The millicent protocols for electronic commerce. In WOEC'95: Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce, pages 9--9, Berkeley, CA, USA, 1995. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Merkle. Protocols for public key cryptosystems. In IEEE Symposium on Research in Security and Privacy, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  28. World Wide Web Consortium: Micro Payment Transfer Protocol (MPTP). Online at http://www.w3.org/TR/WD-mptp-951122.Google ScholarGoogle Scholar
  29. J. Ngan, R. Dingledine, and D. Wallach. Building incentives into Tor. Technical report.Google ScholarGoogle Scholar
  30. The openSSL project. OpenSSL: The open source toolkit for SSL/TLS. www.openssl.org.Google ScholarGoogle Scholar
  31. R.L. Rivest. Electronic lottery tickets as micropayments. In R. Hirschfeld, editor, Financial Cryptography, pages 307--314, Anguilla, British West Indies, 1997. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R.L. Rivest and A. Shamir. Payword and micromint: Two simple micropayment schemes. In Proceedings of the International Workshop on Security Protocols, pages 69--87, London, UK, 1997. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. D.R. Simon. Anonymous communication and anonymous cash. In CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pages 61--73, London, UK, 1996. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Stadler, J.-M. Piveteau, and J. Camenisch. Fair blind signatures. In Proceedings of EUROCRYPT, pages 209--219, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. B. Yang and H. Garcia-Molina. Ppay: micropayments for peer-to-peer systems. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 300--310, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Yen, J. Lee, and J. Lee. Payfair: A prepaid internet micropayment scheme promising customer fairness. In Proc. of International Workshop on Cryptographic Techniques and E-Commerce, CrypTEC 99, pages 213--221, 1999.Google ScholarGoogle Scholar

Index Terms

  1. XPay: practical anonymous payments for tor routing and other networked services

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society
        November 2009
        130 pages
        ISBN:9781605587837
        DOI:10.1145/1655188

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 November 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate106of355submissions,30%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader