Sciweavers

FC
1999
Springer
97views Cryptology» more  FC 1999»
13 years 8 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
FC
1999
Springer
160views Cryptology» more  FC 1999»
13 years 8 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
FC
1999
Springer
184views Cryptology» more  FC 1999»
13 years 8 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma
FC
1999
Springer
102views Cryptology» more  FC 1999»
13 years 8 months ago
Risk Management for E-Cash Systems with Partial Real-Time Audit
We analyze “coin-wallet” and “balance-wallet” under partial real-time audit, and compute upper bounds on theft due to the fact that not all the transactions are audited in ...
Yacov Yacobi
FC
1999
Springer
94views Cryptology» more  FC 1999»
13 years 8 months ago
Towards Making Broadcast Encryption Practical
Michel Abdalla, Yuval Shavitt, Avishai Wool