Sciweavers

FC
2000
Springer
98views Cryptology» more  FC 2000»
13 years 8 months ago
Authentic Attributes with Fine-Grained Anonymity Protection
Stuart G. Stubblebine, Paul F. Syverson
FC
2000
Springer
127views Cryptology» more  FC 2000»
13 years 8 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
FC
2000
Springer
150views Cryptology» more  FC 2000»
13 years 8 months ago
Self-Scrambling Anonymizers
For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency...
David Pointcheval
FC
2000
Springer
78views Cryptology» more  FC 2000»
13 years 8 months ago
Postal Revenue Collection in the Digital Age
In recent years postal revenue collection underwent a major transformation due to widespread transition to digital methods of communication. This transition directly affected not o...
Leon A. Pintsov, Scott A. Vanstone
FC
2000
Springer
90views Cryptology» more  FC 2000»
13 years 8 months ago
Signing on a Postcard
David Naccache, Jacques Stern
FC
2000
Springer
106views Cryptology» more  FC 2000»
13 years 8 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
FC
2000
Springer
119views Cryptology» more  FC 2000»
13 years 8 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
FC
2000
Springer
80views Cryptology» more  FC 2000»
13 years 8 months ago
Statistics and Secret Leakage
Jean-Sébastien Coron, Paul C. Kocher, David...
FC
2000
Springer
83views Cryptology» more  FC 2000»
13 years 8 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
FC
2000
Springer
102views Cryptology» more  FC 2000»
13 years 8 months ago
Asymmetric Currency Rounding
David M'Raïhi, David Naccache, Michael Tunsta...