Self-certified keys—concepts and applications
H Petersenl, P Horster - Communications and Multimedia Security: Volume …, 1997 - Springer
The authenticity of public keys in an asymmetric cryptosystem can be gained in two different
ways: either it is verified explicitly after knowing the public key and its certificate, eg X. 509 …
ways: either it is verified explicitly after knowing the public key and its certificate, eg X. 509 …
Auditable, anonymous electronic cash
T Sander, A Ta-Shma - Advances in Cryptology—CRYPTO'99: 19th …, 1999 - Springer
Most anonymous, electronic cash systems are signature-based. A side effect of this is that in
these systems the bank has the technical ability to issue unreported, valid money. It has …
these systems the bank has the technical ability to issue unreported, valid money. It has …
A response to “can we eliminate certificate revocation lists?”
P McDaniel, A Rubin - … : 4th International Conference, FC 2000 Anguilla …, 2001 - Springer
The massive growth of electronic commerce on the Internet heightens concerns over the
lack of meaningful certificate management. One issue limiting the availability of such …
lack of meaningful certificate management. One issue limiting the availability of such …
A novel electronic cash system with trustee-based anonymity revocation from pairing
Untraceable electronic cash is an attractive payment tool for electronic-commerce because
its anonymity property can ensure the privacy of payers. However, this anonymity property is …
its anonymity property can ensure the privacy of payers. However, this anonymity property is …
Self-scrambling anonymizers
D Pointcheval - … Cryptography: 4th International Conference, FC 2000 …, 2001 - Springer
For the two last decades, people have tried to provide practical electronic cash schemes,
with more or less success. Indeed, the most secure ones generally suffer from inefficiency …
with more or less success. Indeed, the most secure ones generally suffer from inefficiency …
Satoshi Nakamoto and the Origins of Bitcoin--The Profile of a 1-in-a-Billion Genius
J Ducrée - arXiv preprint arXiv:2206.10257, 2022 - arxiv.org
The mystery about the ingenious creator of Bitcoin concealing behind the pseudonym
Satoshi Nakamoto has been fascinating the global public for more than a decade. Suddenly …
Satoshi Nakamoto has been fascinating the global public for more than a decade. Suddenly …
Efficient scalable fair cash with off-line extortion prevention
H Petersen, G Poupard - … Security: First International Conference, ICIS'97 …, 1997 - Springer
There have been many proposals to realize anonymous electronic cash. Although these
systems offer high privacy to the users, they have the disadvantage that the anonymity might …
systems offer high privacy to the users, they have the disadvantage that the anonymity might …
A secrecy scheme for MPEG video data using the joint of compression and encryption
M Mambo, Y Zheng, SU Shin, KS Sim… - … , ISW'99 Kuala Lumpur …, 1999 - Springer
We propose a fast encryption method for MPEG video which encrypts the sign bits of DC
coefficients and uses a random scan instead of zig-zag one. The proposed algorithm is a …
coefficients and uses a random scan instead of zig-zag one. The proposed algorithm is a …
Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited
T Nishide, K Sakurai - 2011 Third International Conference on …, 2011 - ieeexplore.ieee.org
In the design of electronic cash systems, we usually focus on preventing customers'
malicious behaviors. However, since authorities such as banks and certificate authorities …
malicious behaviors. However, since authorities such as banks and certificate authorities …
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem
In this paper, we design and implement an efficient fair off-line electronic cash system based
on Elliptic Curve Discrete Logarithm Problem (ECDLP), in which the anonymity of coins is …
on Elliptic Curve Discrete Logarithm Problem (ECDLP), in which the anonymity of coins is …