Check out the new USENIX Web site. next up previous
Next: Payment Up: Processes and Protocols Previous: Processes and Protocols

Coin Purchase


 
Figure 4:   The Coin Purchase process.
\begin{figure*}
\epsfxsize=4in
\centerline{\epsffile{withdrawal-fig.ps}}\end{figure*}

The Coin Purchase process involves the coin purchaser, the issuer and the coin purchaser's bank. The coin purchaser specifies how much he wants in e-coins, and in what denominations, and provides the information to make the coin purchase from the bank. The issuer makes the coin purchase and then issues the coins.


  
Figure 5: Coin Purchase rotocol
\begin{figure*}
\begin{center}

\fbox {
 \begin{minipage}
{6.1in}\begin{list}
{\...
 ...mm}\end{small}\end{minipage}\end{list}\end{minipage}}
 \end{center}\end{figure*}

The requirements are as follows:

A protocol for the coin purchase process is shown in Figure 5. The field ${\rm{W}\mbox{-}DESC}$ contains two things. First, the type and number of coins he wants: this is a list of denominations, and, for each denomination, the number of coins of that denomination that are desired (see Section 2.4). Second, information necessary to enable the issuer to get paid, in real funds of equal value to the total dollar value of the coins. Here we take the case that this payment is made by coin purchase from the coin purchaser's bank, so this information includes the bank name and address, and the coin purchaser's account number.[*] Note that this protocol does not make use of a certification authority. It assumes that the parties have each other's public keys and certificates already cached. The coin purchaser has the issuer ID and public key in his purse from enrollment, and similarly the issuer has the coin purchaser ID and public key in his database from enrollment.

There are three transactions: the coins request, in which the coin purchaser asks for the coins and provides the bank information; the execution, in which the ACH transaction is done; and the final issuance of coins. The protocol is designed to guarantee both privacy and authenticity of the data. This is to protect the coin purchase information and the coins that are issued. It must also provide freshness. For efficiency's sake we use a key exchange protocol to get a session key K under which later messages are encrypted or MACed. However, the coin purchase information is digitally signed for non-repudiability. We now go over the transactions in more detail.

In the full paper we show how requirements W1-3 are met. We now turn to the description of the Payment process.


next up previous
Next: Payment Up: Processes and Protocols Previous: Processes and Protocols
Juan A. Garay
7/20/1998