services offered in exchange for reversible payment.
Anonymity is a necessary, but not sufficient compo-
nent of irreversibility. The payment system proposed
in (D. Chaum, 1988) sacrifices irreversibility in order
to allow for off-line transactions, assuming that com-
munication with the issuing authority is more expen-
sive than communication between the transacting par-
ties or complex computations. At the time of writing,
this might have been the case, but today, when the in-
frastructure for low-bandwidth communication (such
as short text messages, http queries, etc.) is ubiqui-
tous, the benefits of off-line transactions are clearly
inferior to those of irreversible transactions.
The peer-to-peer nature of a payment system also
removes a significant cost; if a contract with a third
party is necessary to receive payments, it is very likely
that this third party will charge for its service. This
raises the entry barrier for sellers and thus narrows
the assortment of goods and services available in ex-
change for the payment that is not peer-to-peer, re-
ducing its liquidity. In addition to this, merchant con-
tracts unnecessarily expose sellers to the provider of
the payment service; their income becomes known. It
is important to emphasize that by peer-to-peer pay-
ment I do not imply that there are no servers or other
centralized entities involved; it merely means that
there is no distinction between sellers and buyers,
merchants and customers. Anyone can pay anyone.
Na
¨
ıve transactions help reducing the costs of dis-
tributing the tools (hardware and software) used
for transactions. Contrarily to the assumptions of
(D. Chaum, 1988), computation is far less ubiquitous
than communication. While everyone with a cellu-
lar or a touch-tone telephone, a web-browser or email
client in its readily available, out-of-box configuration
is able to transmit short messages (up to a few hun-
dred bits), performing complex calculations involving
strong asymmetric cryptography requires additional
tools which not everyone possesses or can afford to
run. The fact that it is impossible to transact without
performing complex calculations in real time is a far
more serious obstacle than the need to contact the is-
suer for each transaction. It also undermines the trust
in the system, as the the failure of the equipment used
for storing and transacting with such “cash” (a very
serious problem with (Brands, 1993b)) can cause un-
limited damage, that cannot be mitigated. The fact
that low-tech, na
¨
ıve transactions are possible (and, in
fact, quite common) with cash, greatly contributes to
its acceptance and popularity. It is important to stress
that no-one is forced to transact na
¨
ıvely, and always
has a choice of performing extra verification and dis-
cover attempts at cheating. Just as one always has the
option of verifying one or more security features of a
banknote before accepting it.
The transparent governance of the issuer is perhaps
the most important reason to trust it. If the issuer is
able to issue digital money without anybody noticing,
its creditworthiness cannot be established and the in-
centive to hyper-inflate (overborrowing by irrespon-
sible emission) is enormous. While the information
about the distribution and the holders of cash is pri-
vate, its total amount should be public and verifiable.
The lack of transparency of emission, in the author’s
opinion, is among the primary reasons for the failure
of digital cash-like payment systems in the market.
In the rest of the paper, we develop a set of pro-
tocols that provide for all of the above characteris-
tics of a digital payment system under certain model
assumptions. The proposed system resembles the
one proposed by Jakobbson (Jakobsson, 1999) in that
it can be regarded as one with disposable anony-
mous accounts. Such disposable anonymous ac-
count based systems have achieved greater accep-
tance in the market (most notably WebMoney at
http://wmtransfer.com) than those based on
untraceable transfers between accounts tied to iden-
tity, but the current implementations either do not pro-
vide sufficient security for high-value transactions or
impose too high overhead costs on low-value ones.
The system outlined in this paper permits the users
to choose the appropriate security measures that they
deem appropriate for the given transaction. This is
our principal contribution.
2 PRELIMINARIES
In the proposed system, the issuer I maintains a pub-
lic record of transactions, consisting of a chronologi-
cally ordered sequence of digitally signed statements
S
i
, where i = 1, 2, 3, . . . is called the serial number
of the statement. The serial number can be unambigu-
ously inferred from S
i
. Digitally signed means that
anybody can verify using only publicly available in-
formation in a computationally inexpensive way that
S
i
originates form I. Public-key signature schemes
such as those described in (R. L. Rivest, 1978; Elga-
mal, 1985; NIST, 1991) can provide for such func-
tionality in practice, together with some public key
distribution protocol. These implementation details
lie outside of the scope of this paper.
After some S
n
has been published, it can be veri-
fied by anyone that for all i ∈ N
+
such that i < n,
S
i
has also been (previously) published and that dif-
ferent statements do not share the same serial number.
The structure of the statements is the following: S
i
=
(i, I, V
i
, C
i
, N
i
, Σ
i
) where Σ
i
= σ
I
(i, I, V
i
, C
i
, N
i
)
is the digital signature unique to the rest of S
i
and I.
Each statement implies the promise of issuer I to pay
V
i
units of value to anyone who first responds to cryp-
tographic challenge C
i
(which requires the possession
of some secret D
i
). N
i
is the request message result-
ON DIGITAL CASH-LIKE PAYMENT SYSTEMS
67