[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/88314.88969guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article
Free access

Untraceable electronic cash

Published: 01 February 1990 Publication History
First page of PDF

References

[1]
Brassard, G. and C. Crépeau, Zero-knowledge simulation of Boolean circuits, presented at Crypto '86, 1986.
[2]
Brassard, G. and C. Crépeau, Zero-knowledge simulation of Boolean circuits, Proc. of 27th Symp. on Foundations of Computer Science, 1986.
[3]
Brassard, G., Chaum D., and C. Crépeau, Minimum Disclosure Proofs of Knowledge. Center for Mathematics and Computer Science, Report PM-R8710, December 1987.
[4]
Chaum, D., Security without identification: transaction systems to make big brother obsolete, Comm. ACM 28, 10 (October 1985).
[5]
Chaum, D., Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How, presented at Crypto '86, 1986.
[6]
Chaum, D., Privacy Protected Payments: Unconditional Payer And/Or Payee Untracability, Smartcard 2000, North Holland, 1988.
[7]
Chaum, D. and J.H. Evertse, Showing credentials without identification: signatures transferred between unconditionally unlinkable pseudonyms, Proceedings of Crypto '86, Springer-Verlag, 1987.
[8]
Chaum, D., I. Damgaard, and J. v.d. Graaf, Multiparty computations ensuring the privacy of each party's input and the correctness of the result, Proceedings of Crypto 87, Springer-Verlag, 1988.
[9]
Goldwasser, S., S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof Systems, Proc. of 17th ACM symp. on Theory of Computation, 1985.
[10]
Goldreich, O., S. Micali, and A. Wigderson, How to prove all NP-statements in zero-knowledge, and a methodology of cryptographic protocol design, presented at Crypto '86, 1986.
[11]
Goldreich, O., S. Micali, and A. Wigderson, Proofs that yield nothing but their validity and a methodology of cryptographic protocol design, Proc. of 27th Symp. on Foundations of Computer Science, 1986.
[12]
Rabin, M.O., Digitalized signatures, in Foundations of Secure Computation, Academic Press, NY, 1978.
[13]
Rivest, R.L., A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, CACM 21, 2 (February 1978).

Cited By

View all
  • (2022)OpenNymSecurity and Privacy10.1002/spy2.2015:2Online publication date: 6-Mar-2022
  • (2019)The limit of blockchainsCommunications of the ACM10.1145/327427662:5(64-69)Online publication date: 24-Apr-2019
  • (2019)Off-line digital cash schemes providing untraceability, anonymity and changeElectronic Commerce Research10.1007/s10660-018-9289-819:1(81-110)Online publication date: 1-Mar-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '88: Proceedings on Advances in cryptology
February 1990
591 pages
ISBN:0387971963

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 February 1990

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)214
  • Downloads (Last 6 weeks)26
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)OpenNymSecurity and Privacy10.1002/spy2.2015:2Online publication date: 6-Mar-2022
  • (2019)The limit of blockchainsCommunications of the ACM10.1145/327427662:5(64-69)Online publication date: 24-Apr-2019
  • (2019)Off-line digital cash schemes providing untraceability, anonymity and changeElectronic Commerce Research10.1007/s10660-018-9289-819:1(81-110)Online publication date: 1-Mar-2019
  • (2018)Fraud Track on Secure Electronic Check SystemInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201804010810:2(137-144)Online publication date: 1-Apr-2018
  • (2018)Design of electronic payment system based on authenticated key exchangeElectronic Commerce Research10.1007/s10660-016-9246-318:2(359-388)Online publication date: 1-Jun-2018
  • (2017)BLCACM Transactions on Privacy and Security10.1145/304176020:2(1-25)Online publication date: 25-May-2017
  • (2017)UshareProceedings of the 11th International Conference on Ubiquitous Information Management and Communication10.1145/3022227.3022325(1-6)Online publication date: 5-Jan-2017
  • (2017)Double-authentication-preventing signaturesInternational Journal of Information Security10.1007/s10207-015-0307-816:1(1-22)Online publication date: 1-Feb-2017
  • (2016)Condensed Cryptographic Currencies Crash Course (C5)Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2976754(1857-1858)Online publication date: 24-Oct-2016
  • (2016)Cryptographic Currencies Crash Course (C4)Proceedings of the 25th International Conference Companion on World Wide Web10.1145/2872518.2891066(1021-1024)Online publication date: 11-Apr-2016
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media