DMCA
Electronic Payments of Small Amounts (1996)
Cached
Download Links
- [www.cl.cam.ac.uk]
- [www.daimi.au.dk]
- [www.daimi.au.dk]
- DBLP
Other Repositories/Bibliography
Citations: | 54 - 0 self |
Citations
3888 | A method for obtaining digital signatures and public key cryptosystems
- Rivest, Shamir, et al.
- 1978
(Show Context)
Citation Context ...on, and the total complexity of both transactions is comparable to that of a payment of a fixed amount. 1 Introduction The introduction of public key crypto-systems and digital signatures ([DH76] and =-=[RSA78]-=-) has led to the construction of many different types of payment systems. During payment at least one and often more digital signatures must be created and verified. This has the advantage that it can... |
3533 | New directions in cryptography
- Diffie, Hellman
- 1976
(Show Context)
Citation Context ...communication, and the total complexity of both transactions is comparable to that of a payment of a fixed amount. 1 Introduction The introduction of public key crypto-systems and digital signatures (=-=[DH76]-=- and [RSA78]) has led to the construction of many different types of payment systems. During payment at least one and often more digital signatures must be created and verified. This has the advantage... |
547 | Password authentication with insecure communication
- Lamport
- 1981
(Show Context)
Citation Context ...ing payment makes (something like) a signature on a message describing the recipient and the amount to be paid. The method is most easily explained as an application of Lamport's password scheme (see =-=[Lam81]-=-) to encode amounts in payments. An earlier application of repeated computations of one-way functions is described in [Mer90] and attributed to Winternitz (1979). In relation to payment systems a simi... |
446 | The MD5 message digest algorithm - Rivest - 1992 |
439 |
A certified digital signature
- Merkle
- 1989
(Show Context)
Citation Context ... most easily explained as an application of Lamport's password scheme (see [Lam81]) to encode amounts in payments. An earlier application of repeated computations of one-way functions is described in =-=[Mer90]-=- and attributed to Winternitz (1979). In relation to payment systems a similar idea is used in [BC90] to encode amounts. The encoding suggested in the following is a simplification of that in [BC90] s... |
325 | Untraceable electronic cash
- Chaum, Fiat, et al.
- 1990
(Show Context)
Citation Context ..., Fer93, Bra94]). As this often requires a large number of coins in a payment, leading to inefficiency with respect to time, storage and communication, electronic cheques with refund were proposed in =-=[CFN90]-=-. Here, the user obtains (buys) a number of cheques during withdrawal. Each cheque has an upper limit and can be spent for any amount up to this limit. A possibly remaining amount of a cheque can late... |
291 |
New directions in cryptography
- Die, Hellman
- 1976
(Show Context)
Citation Context ...d communication, and the total complexity of both transactions is comparable to that of a payment of a xed amount. 1 Introduction The introduction of public key crypto-systems and digital signatures (=-=[DH76]-=- and [RSA78]) has led to the construction of many di erent types of payment systems. During payment at least one and often more digital signatures must be created and veri ed. This has the advantage t... |
274 | Untraceable off-line cash in wallets with observers (extended abstract),” in - Brands - 1993 |
153 |
One-way functions and pseudorandom generators.
- Levin
- 1987
(Show Context)
Citation Context ...over all random choices during payment and deposit. Unchangeability ensures that amounts and other information encoded in m cannot be changed. The function f must be one-way on its iterates (see also =-=[Lev85]-=-): 1 A function g : IN ! IR is negligible if for all c ? 0 and k sufficiently large jg(k)jsk \Gammac . Definition 3.2 Let f : f0; 1g ! f0; 1g be a length preserving function. f is said to be one-way o... |
115 |
Universal electronic cash
- Okamoto, Ohta
- 1992
(Show Context)
Citation Context ...based systems, but still less practical than encoding amounts as described above since the user must contact the bank in order to convert "refundable" money to "spendable" money. A=-=nother proposal, in [OO92]-=-, is to use so called divisible coins. Here the user can split a coin arbitrarily (i.e., this is much like a cheque with refund, where the refund can be spend). These systems offer more flexibility th... |
98 |
Achieving Electronic Privacy.
- Chaum
- 1992
(Show Context)
Citation Context ...he length of signatures. Since the computations on the users side must be performed by small devices with relatively little computation power such as smart cards or electronic wallets (see [EG84] and =-=[Cha92]-=- for two different types of wallets), it is important that the users part of all transactions can be done very efficiently. Although recent research has improved the efficiency of (privacy protecting)... |
75 | Single term off-line coins,” in - Ferguson - 1993 |
52 | Netcard - a practical electronic cash system - Anderson, Manifavas, et al. |
25 | Off-Line Electronic Cash Based on Secret-Key Certificates - Brands - 1995 |
12 |
Electronic wallet
- Even, Yacobi
- 1999
(Show Context)
Citation Context ...depend on the length of signatures. Since the computations on the users side must be performed by small devices with relatively little computation power such as smart cards or electronic wallets (see =-=[EG84]-=- and [Cha92] for two different types of wallets), it is important that the users part of all transactions can be done very efficiently. Although recent research has improved the efficiency of (privacy... |
11 |
Chaum: SmartCash: a Practical Electronic Payment System; Centrum voor Wiskunde en
- Bos, David
- 1990
(Show Context)
Citation Context ...in payments. An earlier application of repeated computations of one-way functions is described in [Mer90] and attributed to Winternitz (1979). In relation to payment systems a similar idea is used in =-=[BC90]-=- to encode amounts. The encoding suggested in the following is a simplification of that in [BC90] specifically designed for tick payments and can be used in many different systems. The proposed soluti... |
8 | Integrity Primitives for Secure Information Systems - Bosselaers, Preneel - 1995 |
6 |
A certi ed digital signature
- Merkle
- 1990
(Show Context)
Citation Context ... most easily explained as an application of Lamport's password scheme (see [Lam81]) to encode amounts in payments. An earlier application of repeated computations of one-way functions is described in =-=[Mer90]-=- and attributed to Winternitz (1979). In relation to payment systems a similar idea is used in [BC90] to encode amounts. The encoding suggested in the following is a simpli cation of that in [BC90] sp... |
5 | Untraceable o -line cash in wallet with observers - Brands - 1993 |
5 |
Achieving electronic privacy", Scienti c American
- Chaum
- 1992
(Show Context)
Citation Context ...he length of signatures. Since the computations on the users side must be performed by small devices with relatively little computation power such as smart cards or electronic wallets (see [EG84] and =-=[Cha92]-=- for two di erent types of wallets), it is important that the users part of all transactions can be done very e ciently. Although recent research has improved the e ciency of (privacy protecting) elec... |
2 | RIPE Integrity Primitives, Final report of RACE 1040. Reports CS-R9324 and CS-R9325, Centrum voor Wiskunde en Informatica - Boer, Boly, et al. - 1993 |
1 | Single Term O -Line Coins - Ferguson - 1993 |