메뉴 건너뛰기




Volumn 1189, Issue , 1997, Pages 33-48

Practical escrow cash systems

Author keywords

[No Author keywords available]

Indexed keywords

CRIME;

EID: 84978975533     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-62494-5_3     Document Type: Conference Paper
Times cited : (15)

References (31)
  • 1
    • 84867248592 scopus 로고
    • Untraceable Off-line Cash in Wallet with Observers
    • Brands, S., "Untraceable Off-line Cash in Wallet with Observers," Proceedings of Crypto 93, pp. 302-318 (1994).
    • (1994) Proceedings of Crypto 93 , pp. 302-318
    • Brands, S.1
  • 2
    • 84855307917 scopus 로고
    • Restrictive Blinding of Secret-Key Certificates
    • Brands, S., "Restrictive Blinding of Secret-Key Certificates," Proceedings of Eurocrypt 95, pp. 231-247 (1995).
    • (1995) Proceedings of Eurocrypt 95 , pp. 231-247
    • Brands, S.1
  • 3
    • 84995460223 scopus 로고    scopus 로고
    • Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change
    • Brickell, E., Gemmell, P., and Kravitz, D., "Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change," Proceedings of SODA95, pp. 457-466.
    • Proceedings of SODA95 , pp. 457-466
    • Brickell, E.1    Gemmell, P.2    Kravitz, D.3
  • 4
    • 0002531104 scopus 로고    scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • Ben-Or, M., Goldwasser, S., and Wigderson, A., "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation," Proceeding of STOC88, pp 11-17.
    • Proceeding of STOC88 , pp. 11-17
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Address, and Digital Pseudonyms
    • Chaum, D., "Untraceable Electronic Mail, Return Address, and Digital Pseudonyms," Comm, of the ACM, 24, 2, pp. 84-88 (1981).
    • (1981) Comm, of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 0001604533 scopus 로고
    • Blind Signatures for Untraceable Payments
    • Chaum, D., "Blind Signatures for Untraceable Payments." Proceedings of Crypto 92, pp. 199-203. (1992).
    • (1992) Proceedings of Crypto 92 , pp. 199-203
    • Chaum, D.1
  • 8
    • 0022145479 scopus 로고
    • Security without Identification: Transaction Systems to Make Big Brother Obsolete
    • Chaum, D., "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm, of the ACM, 28, 10, pp. 1030-1044 (1985).
    • (1985) Comm of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 12
    • 0348118046 scopus 로고
    • Practical and Provably Secure Release of a Secret and Exchange of Signatures
    • Damgård, I., "Practical and Provably Secure Release of a Secret and Exchange of Signatures," Proceedings of Eurocrypt 93 (1993).
    • (1993) Proceedings of Eurocrypt 93
    • Damgård, I.1
  • 14
    • 85029610462 scopus 로고
    • Communication Efficient Zero-Knowledge Proofs of Knowledge (with Applications to Electronic Cash)
    • De Santis, A. and Persiano, G., "Communication Efficient Zero-Knowledge Proofs of Knowledge (with Applications to Electronic Cash)" Proceedings of STACS 92, pp. 449-460 (1992).
    • (1992) Proceedings of STACS 92 , pp. 449-460
    • De Santis, A.1    Persiano, G.2
  • 17
    • 85070424293 scopus 로고
    • Secure and Efficient Off-Line Digital Money
    • Franklin, M. and Yung, M., "Secure and Efficient Off-Line Digital Money," Proceedings of ICALP 93, pp. 449-460 (1993).
    • (1993) Proceedings of ICALP 93 , pp. 449-460
    • Franklin, M.1    Yung, M.2
  • 18
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • Goldwasser, S., Micali, S. and Rivest, R., "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks," SIAM J. Comput., 17, 2, pp. 281-308 (1988).
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 21
    • 85032469094 scopus 로고
    • Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash
    • Hayes, B., "Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash," Proceedings of Auscrypt 90, pp. 294-305 (1990).
    • (1990) Proceedings of Auscrypt 90 , pp. 294-305
    • Hayes, B.1
  • 22
    • 84990243255 scopus 로고
    • Disposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash
    • Okamoto, T., and Ohta, K., "Disposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash," Proceedings of Crypto 89, pp. 481-496 (1990).
    • (1990) Proceedings of Crypto 89 , pp. 481-496
    • Okamoto, T.1    Ohta, K.2
  • 24
    • 84957610389 scopus 로고
    • An Efficient Divisible Electronic Cash Scheme
    • Okamoto, T., "An Efficient Divisible Electronic Cash Scheme," Proceedings of Crypto 95, pp. 438-451 (1995).
    • (1995) Proceedings of Crypto 95 , pp. 438-451
    • Okamoto, T.1
  • 25
    • 85028827324 scopus 로고
    • New Protocols for Electronic Money
    • Pailles, J. C., "New Protocols for Electronic Money," Proceedings of Auscrypt 92, pp. 263-274 (1993).
    • (1993) Proceedings of Auscrypt 92 , pp. 263-274
    • Pailles, J.C.1
  • 26
    • 84982943258 scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • Pedersen, T. P., "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," Proceedings of Crypto 91, pp. 129-140 (1992).
    • (1992) Proceedings of Crypto 91 , pp. 129-140
    • Pedersen, T.P.1
  • 27
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • Shamir, A., "How to share a secret," Communications of the ACM, v. 24, n. 11, Nov 1979, pp. 612-613.
    • (1979) Communications of the ACM , vol.24 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 50749133265 scopus 로고
    • On Blind Signatures and Perfect Crimes
    • von Solms, S., and Naccache, D., "On Blind Signatures and Perfect Crimes." Computer and Security, 11 (1992) pp 581-583.
    • (1992) Computer and Security , vol.11 , pp. 581-583
    • von Solms, S.1    Naccache, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.