메뉴 건너뛰기




Volumn 700 LNCS, Issue , 1993, Pages 265-276

Secure and efficient off-line digital money

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; COMPUTATIONAL COMPLEXITY; ELECTRONIC MONEY; ROBOTS;

EID: 84944906479     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-56939-1_78     Document Type: Conference Paper
Times cited : (67)

References (30)
  • 1
    • 4243410887 scopus 로고
    • Master’s thesis, Eindhoven University of Technology
    • C. van Antwerpen, “Electronic cash,” Master’s thesis, Eindhoven University of Technology, 1990.
    • (1990) Electronic Cash
    • Van Antwerpen, C.1
  • 3
    • 0021522644 scopus 로고
    • How to generate cryptographlcally strong sequences of pseudo random bits
    • M. Blum and S. Micali, “How to generate cryptographlcally strong sequences of pseudo random bits”, SIAM J. Comput. 13, 850-864-1984.
    • (1984) SIAM J. Comput , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 4
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • October
    • D. Chaum, “Security without identification: transaction systems to make big brother obsolete,” CACM 28, 10 (October 1985).
    • (1985) CACM , vol.28 , pp. 10
    • Chaum, D.1
  • 5
    • 0002391080 scopus 로고    scopus 로고
    • Untraceable electronic cash
    • D. Ckaum, A. Fiat, and M. Naor, “Untraceable electronic cash”, Crypto 88, pp. 319-327.
    • Crypto , vol.88 , pp. 319-327
    • Ckaum, D.1    Fiat, A.2    Naor, M.3
  • 6
    • 85031802442 scopus 로고    scopus 로고
    • Payment systems and credential mechanisms with provable security against abuse by individuals
    • I. Damgärd Payment systems and credential mechanisms with provable security against abuse by individuals,” Crypto 88, pp. 328-335.
    • Crypto , vol.88 , pp. 328-335
    • Damgärd, I.1
  • 8
    • 85029610462 scopus 로고
    • Communication efficient zero-knowledge proofs of knowledge (With applications to electronic cash)
    • A. De Santis and G. Persiano, “Communication efficient zero-knowledge proofs of knowledge (with applications to electronic cash),” STAGS 1992, pp. 449-460.
    • (1992) STAGS , pp. 449-460
    • De Santis, A.1    Persiano, G.2
  • 9
    • 85028913061 scopus 로고
    • On-line/off-line digital signatures
    • S. Even, O. Goldreieh, and S. Mieali, “On-line/off-line digital signatures,” Crypto 1989, pp. 263-275.
    • (1989) Crypto , pp. 263-275
    • Even, S.1    Goldreieh, O.2    Mieali, S.3
  • 11
    • 0024135240 scopus 로고
    • Zero-Knowledge Proofs of Identity
    • U. Feige, A. Fiat, and A. Shamir, Zero-Knowledge Proofs of Identity,” J. Cryptology, Vol. 1, No. 2, 1988, pp. 77-94.
    • (1988) J. Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 12
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • O. Goldreich and L. Levin, “A hard-core predicate for all one-way functions,” STOC 1989, pp. 25-32.
    • (1989) STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 13
    • 0022914590 scopus 로고
    • Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design
    • O. Goldreich, S. Mieali, and A. Wigderson, “Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design,” FOGS 1986, 174-187.
    • (1986) FOGS , pp. 174-187
    • Goldreich, O.1    Mieali, S.2    Wigderson, A.3
  • 14
    • 0021409284 scopus 로고
    • Probabilistie encryption
    • S. Goldwasser and S. Micali, “Probabilistie encryption,” JCSS 28, pp. 644-654, 1984.
    • (1984) JCSS , vol.28 , pp. 644-654
    • Goldwasser, S.1    Micali, S.2
  • 15
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Mieali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” SIAM J. Gomput., Vol. 18, 1989, pp. 186-208.
    • (1989) SIAM J. Gomput. , vol.18 , pp. 186-208
    • Goldwasser, S.1    Mieali, S.2    Rackoff, C.3
  • 16
    • 0025115363 scopus 로고
    • Pseudo-random generators under uniform assumptions
    • J.T. Ifastad, “Pseudo-random generators under uniform assumptions,” STOC 1990. 395-404.
    • (1990) STOC , pp. 395-404
    • Ifastad, J.T.1
  • 17
    • 84893538567 scopus 로고
    • Making electronic refunds safer
    • abstracts, 3.7-3.10
    • R. Hirschfeld, “Making electronic refunds safer,” Crypto 1992 abstracts, 3.7-3.10.
    • (1992) Crypto
    • Hirschfeld, R.1
  • 18
    • 0003165811 scopus 로고
    • One-way functions are essential for complexity based cryptography
    • K. Impagliazzo and M. Luby, “One-way functions are essential for complexity based cryptography,” FOGS 1989, 236-243.
    • (1989) FOGS , pp. 236-243
    • Impagliazzo, K.1    Luby, M.2
  • 19
    • 0024866111 scopus 로고
    • Pseudorandom generation from one-way functions
    • K. Impagliazzo, L. Levin, and M. Luby, “Pseudorandom generation from one-way functions,” STOC 1989, pp. 12-24.
    • (1989) STOC , pp. 12-24
    • Impagliazzo, K.1    Levin, L.2    Luby, M.3
  • 21
    • 0023985034 scopus 로고
    • The discrete logarithm hides O(Log n) bits
    • T. Long and A. Wigderson, “The discrete logarithm hides O(log n) bits,” SIAM J. Gomput. 17, 1988, 363-372.
    • (1988) SIAM J. Gomput. , vol.17 , pp. 363-372
    • Long, T.1    Wigderson, A.2
  • 22
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung, “Universal one-way hash functions and their cryptographic applications,” STOC 1989, pp. 33-43.
    • (1989) STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 23
    • 84990243255 scopus 로고
    • Disposable zero-knowledge authentications and their applications to untraceable electronic cash
    • T. Okamoto and K. Ohta, “Disposable zero-knowledge authentications and their applications to untraceable electronic cash, Crypto 1989, pp. 481-496.
    • (1989) Crypto , pp. 481-496
    • Okamoto, T.1    Ohta, K.2
  • 24
    • 85024576592 scopus 로고
    • Universal electronic cash
    • T. Okamoto and K. Ohta, “Universal electronic cash,” Crypto 1991, pp. 324-337.
    • (1991) Crypto , pp. 324-337
    • Okamoto, T.1    Ohta, K.2
  • 25
    • 0013315368 scopus 로고    scopus 로고
    • How to break and repair a ‘provably secure untraceable payment system,”
    • B. Pfitzmann and M. Waldner, “How to break and repair a ‘provably secure’ untraceable payment system,” Crypto 91, pp. 338-350.
    • Crypto , vol.91 , pp. 338-350
    • Pfitzmann, B.1    Waldner, M.2
  • 26
    • 0347802687 scopus 로고
    • Digital signatures
    • R. DeMillo, D. Dobkin, A. Jones, and R. Lipton (editors), Academic Press, NY
    • M. Rabin, Digital signatures,” in Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton (editors), Academic Press, NY, 1978, 155-188.
    • (1978) Foundations of Secure Computation , pp. 155-188
    • Rabin, M.1
  • 27
  • 28
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosysterns
    • R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosysterns,” CAGM, vol. 21, 1978, pp. 120-126.
    • (1978) CAGM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 29
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • J. Rompel, “One-way functions are necessary and sufficient for secure signatures,” STOC 1990, pp. 387-394.
    • (1990) STOC , pp. 387-394
    • Rompel, J.1
  • 30
    • 0022882770 scopus 로고
    • Itow to generate and exchange secrets
    • A. Yaoj “Itow to generate and exchange secrets,” FOGS 1986 pp. 162-167.
    • (1986) FOGS , pp. 162-167
    • Yaoj, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.