posium on Principles of Programming Languages,
ACM, UK, 2001.
M. Backes, C. Hritcu, and M. Maffei. Automated verifica-
tion of remote electronic voting protocols in the ap-
plied pi-calculus. In CSF, 2008.
Bruno Blanchet. An efficient cryptographic protocol ver-
ifier based on prolog rules. In 14th IEEE Computer
Security Foundations Workshop (CSFW-14), Canada,
2001.
Stefan Brands. Untraceable off-line cash in wallets with
observers (extended abstract). In Proceedings of the
13th Annual International Cryptology Conference on
Advances in Cryptology, CRYPTO ’93, pages 302–
318, London, UK, UK, 1994. Springer-Verlag.
David Chaum, Amos Fiat, and Moni Naor. Untraceable
electronic cash. In Advances in Cryptology: Proceed-
ings of CRYPTO ’88, pages 319–327. Springer New
York, 1990.
S
´
ebastien Canard and Aline Gouget. Anonymity in trans-
ferable e-cash. In Applied Cryptography and Network
Security, ACNS, USA, pages 207–223, 2008.
S
´
ebastien Canard, Aline Gouget, and Jacques Traor
´
e. Im-
provement of efficiency in (unconditional) anonymous
transferable e-cash. In Financial Cryptography and
Data Security, 12th International Conference, FC,
Mexico. Springer, 2008.
David Chaum. Blind signatures for untraceable payments.
In Advances in Cryptology: Proceedings of CRYPTO
’82. Springer US, 1983.
Giovanni Di Crescenzo. A non-interactive electronic cash
system. In Algorithms and Complexity, Second Ital-
ian Conference, Italy, volume 778 of Lecture Notes in
Computer Science, pages 109–124. Springer, 1994.
Chang Yu Cheng, Jasmy Yunus, and Kamaruzzaman Se-
man. Estimations on the security aspect of brand’s
electronic cash scheme. In 19th International Confer-
ence on Advanced Information Networking and Appli-
cations AINA, Taiwan, 2005.
I. B. Damg
˚
ard. Payment systems and credential mecha-
nisms with provable security against abuse by indi-
viduals. In Proceedings on Advances in Cryptology,
pages 328–335. Springer-Verlag, 1990.
Stefano D’Amiano and Giovanni Di Crescenzo. Methodol-
ogy for digital money based on general cryptographic
tools. In Advances in Cryptology - EUROCRYPT ’94,
Workshop on the Theory and Application of Crypto-
graphic Techniques, Italy. Springer, 1994.
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal
Lafourcade, Gabriele Lenzini, and Peter Y. A. Ryan.
Formal analysis of electronic exams. In SECRYPT,
Austria, 2014, pages 101–112, 2014.
S. Delaune, S. Kremer, and M.D. Ryan. Verifying privacy-
type properties of electronic voting protocols. Journal
of Computer Security, 17(4):435–487, jul 2009.
J. Dreier, P. Lafourcade, and Y. Lakhnech. A formal tax-
onomy of privacy in voting protocols. In ICC, pages
6710–6715, 2012.
Jannik Dreier, Pascal Lafourcade, and Yassine Lakhnech.
Formal verification of e-auction protocols. In Prin-
ciples of Security and Trust, POST, pages 247–266.
Springer, 2013.
D. Dolev and Andrew C. Yao. On the security of public key
protocols. Information Theory, IEEE Transactions on,
29(2):198–208, 1983.
Niels Ferguson. Single term off-line coins. In Advances
in Cryptology, Lecture Notes in Computer Science
- EUROCRYPT ’93, volume 765, pages 318–328.
Springer-Verlag, 1994.
Chun-I Fan, Vincent Shi-Ming Huang, and Yao-Chun Yu.
User efficient recoverable off-line e-cash scheme with
fast anonymity revoking. Mathematical and Com-
puter Modelling, 2013.
Sangjin Kim and Heekuck Oh. Making electronic refunds
reusable, 2001.
Ralf K
¨
usters and Tomasz Truderung. Reducing protocol
analysis with xor to the xor-free case in the horn the-
ory based approach. Journal of Automated Reasoning,
2011.
Zhengqin Luo, Xiaojuan Cai, Jun Pang, and Yuxin Deng.
Analyzing an electronic cash protocol using applied
pi calculus. In Applied Cryptography and Network
Security, 5th International Conference, ACNS, China,
2007.
Tatsuaki Okamoto and Kazuo Ohta. Disposable zero-
knowledge authentications and their applications to
untraceable electronic cash. In Proceedings on Ad-
vances in Cryptology, CRYPTO ’89, pages 481–496.
Springer-Verlag New York, Inc., 1989.
Marek R. Ogiela and Piotr Sulkowski. Improved cryp-
tographic protocol for digital coin exchange. In
Soft Computing and Intelligent Systems (SCIS), pages
1148–1151, 2014.
Birgit Pfitzmann, Matthias Schunter, and Michael Waidner.
How to break another provably secure payment sys-
tem. In EUROCRYPT ’95, International Conference
on the Theory and Application of Cryptographic Tech-
niques, France, pages 121–132, 1995.
Birgit Pfitzmann and Michael Waidner. How to break
and repair A ”provably secure” untraceable payment
system. In CRYPTO ’91, 11th Annual International
Cryptology Conference, USA, pages 338–350, 1991.
Berry Schoenmakers. Basic security of the ecash pay-
ment system. In In Applied Cryptography, Course
on Computer Security and Industrial Cryptography,
pages 201–231. Springer-Verlag, LNCS, 1997.
Aye Thandar Swe and Khin Khat Khat Kyaw. Formal anal-
ysis of secure e-cash transaction protocol. In Inter-
national Conference on Advances in Engineering and
Technology, Singapore, 2014.
FormalAnalysisofE-CashProtocols
75