Published December 1996
| Published
Journal Article
Open
Anonymous credit cards and their collusion analysis
Chicago
Abstract
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol.
Additional Information
© 1996 IEEE. Manuscript received September 14, 1993, revised October 14, 1994 and January 3, 1996, approved by IEEE/ACM Transactions on Networking, Editor S. S. Lam.Attached Files
Published - LOWieeeacmtn96.pdf
Files
LOWieeeacmtn96.pdf
Files
(1.2 MB)
Name | Size | Download all |
---|---|---|
md5:8759bb3b47ec930b8eedc74317eab9c7
|
1.2 MB | Preview Download |
Additional details
- Eprint ID
- 8583
- Resolver ID
- CaltechAUTHORS:LOWieeeacmtn96
- Created
-
2007-08-21Created from EPrint's datestamp field
- Updated
-
2021-11-08Created from EPrint's last_modified field