Self-certified keys—concepts and applications

H Petersenl, P Horster - Communications and Multimedia Security: Volume …, 1997 - Springer
The authenticity of public keys in an asymmetric cryptosystem can be gained in two different
ways: either it is verified explicitly after knowing the public key and its certificate, eg X. 509 …

Auditable, anonymous electronic cash

T Sander, A Ta-Shma - Advances in Cryptology—CRYPTO'99: 19th …, 1999 - Springer
Most anonymous, electronic cash systems are signature-based. A side effect of this is that in
these systems the bank has the technical ability to issue unreported, valid money. It has …

A response to “can we eliminate certificate revocation lists?”

P McDaniel, A Rubin - … : 4th International Conference, FC 2000 Anguilla …, 2001 - Springer
The massive growth of electronic commerce on the Internet heightens concerns over the
lack of meaningful certificate management. One issue limiting the availability of such …

A novel electronic cash system with trustee-based anonymity revocation from pairing

Y Chen, JS Chou, HM Sun, MH Cho - Electronic Commerce Research and …, 2011 - Elsevier
Untraceable electronic cash is an attractive payment tool for electronic-commerce because
its anonymity property can ensure the privacy of payers. However, this anonymity property is …

Self-scrambling anonymizers

D Pointcheval - … Cryptography: 4th International Conference, FC 2000 …, 2001 - Springer
For the two last decades, people have tried to provide practical electronic cash schemes,
with more or less success. Indeed, the most secure ones generally suffer from inefficiency …

Satoshi Nakamoto and the Origins of Bitcoin--The Profile of a 1-in-a-Billion Genius

J Ducrée - arXiv preprint arXiv:2206.10257, 2022 - arxiv.org
The mystery about the ingenious creator of Bitcoin concealing behind the pseudonym
Satoshi Nakamoto has been fascinating the global public for more than a decade. Suddenly …

Efficient scalable fair cash with off-line extortion prevention

H Petersen, G Poupard - … Security: First International Conference, ICIS'97 …, 1997 - Springer
There have been many proposals to realize anonymous electronic cash. Although these
systems offer high privacy to the users, they have the disadvantage that the anonymity might …

A secrecy scheme for MPEG video data using the joint of compression and encryption

M Mambo, Y Zheng, SU Shin, KS Sim… - … , ISW'99 Kuala Lumpur …, 1999 - Springer
We propose a fast encryption method for MPEG video which encrypts the sign bits of DC
coefficients and uses a random scan instead of zig-zag one. The proposed algorithm is a …

Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

T Nishide, K Sakurai - 2011 Third International Conference on …, 2011 - ieeexplore.ieee.org
In the design of electronic cash systems, we usually focus on preventing customers'
malicious behaviors. However, since authorities such as banks and certificate authorities …

Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem

M Lee, G Ahn, J Kim, J Park, B Lee… - Journal of …, 2002 - ieeexplore.ieee.org
In this paper, we design and implement an efficient fair off-line electronic cash system based
on Elliptic Curve Discrete Logarithm Problem (ECDLP), in which the anonymity of coins is …