skip to main content
An Efficient Off-line Electronic Cash System Based On The Representation Problem.December 1993
1993 Technical Report
Publisher:
  • CWI (Centre for Mathematics and Computer Science)
  • P. O. Box 94079 NL-1090 GB Amsterdam
  • Netherlands
Published:31 December 1993
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Batten L and Yi X (2019). Off-line digital cash schemes providing untraceability, anonymity and change, Electronic Commerce Research, 19:1, (81-110), Online publication date: 1-Mar-2019.
  2. Wang H, He D, Sun Y, Kumar N and Choo K (2018). PAT, Future Generation Computer Systems, 79:P1, (262-270), Online publication date: 1-Feb-2018.
  3. Koblitz N and Menezes A (2016). Cryptocash, cryptocurrencies, and cryptocontracts, Designs, Codes and Cryptography, 78:1, (87-102), Online publication date: 1-Jan-2016.
  4. Baldimtsi F, Kiayias A, Zacharias T and Zhang B Indistinguishable Proofs of Work or Knowledge Proceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 10032, (902-933)
  5. Wang Y and Tanaka K (2016). Generic transformations for existentially unforgeable signature schemes in the bounded leakage model, Security and Communication Networks, 9:12, (1829-1842), Online publication date: 1-Aug-2016.
  6. ACM
    Rupp A, Baldimtsi F, Hinterwälder G and Paar C (2015). Cryptographic Theory Meets Practice, ACM Transactions on Information and System Security, 17:3, (1-31), Online publication date: 27-Mar-2015.
  7. Huaqun Wang , Bo Qin , Qianhong Wu , Li Xu and Domingo-Ferrer J (2015). TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids, IEEE Transactions on Information Forensics and Security, 10:11, (2340-2351), Online publication date: 1-Nov-2015.
  8. Chen X, Li J, Ma J, Lou W and Wong D (2014). New and efficient conditional e-payment systems with transferability, Future Generation Computer Systems, 37:C, (252-258), Online publication date: 1-Jul-2014.
  9. ACM
    Tiwari K and Gupta P Biometrics based observer free transferable E-cash Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (63-70)
  10. Lian B, Chen G and Li J (2014). Provably secure E-cash system with practical and efficient complete tracing, International Journal of Information Security, 13:3, (271-289), Online publication date: 1-Jun-2014.
  11. Kuchta V and Manulis M Rerandomizable Threshold Blind Signatures Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473, (70-89)
  12. ACM
    Camenisch J and Groß T (2012). Efficient Attributes for Anonymous Credentials, ACM Transactions on Information and System Security, 15:1, (1-30), Online publication date: 1-Mar-2012.
  13. ACM
    Bacelar Almeida J, Barbosa M, Bangerter E, Barthe G, Krenn S and Zanella Béguelin S Full proof cryptography Proceedings of the 2012 ACM conference on Computer and communications security, (488-500)
  14. Wen Y and Zhang F (2011). Delegatable secret handshake scheme, Journal of Systems and Software, 84:12, (2284-2292), Online publication date: 1-Dec-2011.
  15. Qiu W, Gong Z, Liu B, Long Y and Chen K (2011). Restrictive partially blind signature for resource-constrained information systems, Knowledge and Information Systems, 26:1, (87-103), Online publication date: 1-Jan-2011.
  16. Furukawa J, Mori K and Sako K An implementation of a mix-net based network voting scheme and its use in a private organization Towards Trustworthy Elections, (141-154)
  17. Błaśkiewicz P, Kubiak P and Kutyłowski M Two-Head dragon protocol Proceedings of the Second international conference on Trusted Systems, (173-188)
  18. Au M, Susilo W and Mu Y Proof-of-knowledge of representation of committed value and its applications Proceedings of the 15th Australasian conference on Information security and privacy, (352-369)
  19. ACM
    Balan R, Ramasubbu N, Prakobphol K, Christin N and Hong J mFerio Proceedings of the 7th international conference on Mobile systems, applications, and services, (291-304)
  20. Ateniese G, Camenisch J, Joye M and Tsudik G (2009). Remarks on "Analysis of one popular group signature scheme" in Asiacrypt 2006, International Journal of Applied Cryptography, 1:4, (320-322), Online publication date: 1-Aug-2009.
  21. Boneh D, Freeman D, Katz J and Waters B Signing a Linear Subspace Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, (68-87)
  22. Hu X and Huang S (2008). Analysis of ID-based restrictive partially blind signatures and applications, Journal of Systems and Software, 81:11, (1951-1954), Online publication date: 1-Nov-2008.
  23. ACM
    Blanton M Online subscriptions with anonymous access Proceedings of the 2008 ACM symposium on Information, computer and communications security, (217-227)
  24. ACM
    Camenisch J, Groß T and Heydt-Benjamin T Rethinking accountable privacy supporting services Proceedings of the 4th ACM workshop on Digital identity management, (1-8)
  25. ACM
    Canard S, Malville E and Traoré J Identity federation and privacy Proceedings of the 4th ACM workshop on Digital identity management, (25-32)
  26. Galbraith S and Verheul E An analysis of the vector decomposition problem Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography, (308-327)
  27. Belenkiy M, Chase M, Kohlweiss M and Lysyanskaya A P-signatures and noninteractive anonymous credentials Proceedings of the 5th conference on Theory of cryptography, (356-374)
  28. Hofheinz D and Kiltz E Programmable Hash Functions and Their Applications Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (21-38)
  29. Chen X, Zhang F and Liu S (2007). ID-based restrictive partially blind signatures and applications, Journal of Systems and Software, 80:2, (164-171), Online publication date: 1-Feb-2007.
  30. Luo Z, Cai X, Pang J and Deng Y Analyzing an Electronic Cash Protocol Using Applied Pi Calculus Proceedings of the 5th international conference on Applied Cryptography and Network Security, (87-103)
  31. Furukawa J and Imai H An efficient aggregate shuffle argument scheme Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, (260-274)
  32. Nguyen L Privacy-protecting coupon system revisited Proceedings of the 10th international conference on Financial Cryptography and Data Security, (266-280)
  33. Chen X, Zhang F, Mu Y and Susilo W Efficient provably secure restrictive partially blind signatures from bilinear pairings Proceedings of the 10th international conference on Financial Cryptography and Data Security, (251-265)
  34. Teranishi I and Sako K k-times anonymous authentication with a constant proving cost Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, (525-542)
  35. Bao H, Cao Z and Lu R (2005). Proxy signature scheme using self-certified public keys, Applied Mathematics and Computation, 169:2, (1380-1389), Online publication date: 1-Oct-2005.
  36. ACM
    Wang S, Hong F and Cui G A fair e-cash payment scheme based on credit Proceedings of the 7th international conference on Electronic commerce, (622-626)
  37. Nguyen L and Safavi-Naini R Dynamic k-times anonymous authentication Proceedings of the Third international conference on Applied Cryptography and Network Security, (318-333)
  38. Wei V Tracing-by-linking group signatures Proceedings of the 8th international conference on Information Security, (149-163)
  39. Chen L, Enzmann M, Sadeghi A, Schneider M and Steiner M A privacy-protecting coupon system Proceedings of the 9th international conference on Financial Cryptography and Data Security, (93-108)
  40. ACM
    Naor M and Reingold O (2004). Number-theoretic constructions of efficient pseudo-random functions, Journal of the ACM, 51:2, (231-262), Online publication date: 1-Mar-2004.
  41. Das A Payment agents Payment technologies for E-commerce, (149-170)
  42. Kwon E, Cho Y and Chae K Refundable electronic cash for mobile commerce Proceedings of the 2nd international conference on Human.society@internet, (644-649)
  43. Furukawa J, Miyauchi H, Mori K, Obana S and Sako K An implementation of a universally verifiable electronic voting scheme based on shuffling Proceedings of the 6th international conference on Financial cryptography, (16-30)
  44. ACM
    Song D Practical forward secure group signature schemes Proceedings of the 8th ACM conference on Computer and Communications Security, (225-234)
  45. Maurer U and Wolf S (2000). The Diffie–Hellman Protocol, Designs, Codes and Cryptography, 19:2-3, (147-171), Online publication date: 1-Mar-2000.
  46. Steiner M, Tsudik G and Waidner M (2000). Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems, 11:8, (769-780), Online publication date: 1-Aug-2000.
  47. Pointcheval D and Stern J (2000). Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, 13:3, (361-396), Online publication date: 1-Jan-2000.
  48. Shoup V Using hash functions as a hedge against chosen ciphertext attack Proceedings of the 19th international conference on Theory and application of cryptographic techniques, (275-288)
  49. Canetti R and Goldwasser S An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack Proceedings of the 17th international conference on Theory and application of cryptographic techniques, (90-106)
  50. Dwork C and Naor M (1998). An Efficient Existentially Unforgeable Signature Scheme and Its Applications, Journal of Cryptology, 11:3, (187-208), Online publication date: 1-Jun-1998.
  51. Naor M and Nissim K Certificate revocation and certificate update Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (17-17)
  52. Sakurai K and Shizuya H (1998). A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems, Journal of Cryptology, 11:1, (29-43), Online publication date: 1-Jan-1998.
  53. Naor M, Ostrovsky R, Venkatesan R and Yung M (1998). Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation, Journal of Cryptology, 11:2, (87-108), Online publication date: 1-Mar-1998.
  54. ACM
    Pointcheval D and Stern J New blind signatures equivalent to factorization (extended abstract) Proceedings of the 4th ACM conference on Computer and communications security, (92-99)
  55. ACM
    Deng R, Han Y, Jeng A and Ngair T A new on-line cash check scheme Proceedings of the 4th ACM conference on Computer and communications security, (111-116)
  56. ACM
    Kelsey J and Schneier B Conditional purchase orders Proceedings of the 4th ACM conference on Computer and communications security, (117-124)
  57. Camenisch J Efficient and generalized group signatures Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, (465-479)
  58. Brands S Rapid demonstration of linear relations connected by boolean operators Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, (318-333)
  59. ACM
    Steiner M, Tsudik G and Waidner M Diffie-Hellman key distribution extended to group communication Proceedings of the 3rd ACM conference on Computer and communications security, (31-37)
  60. ACM
    Jakobsson M and Yung M Revokable and versatile electronic money (extended abstract) Proceedings of the 3rd ACM conference on Computer and communications security, (76-87)
  61. ACM
    Camenisch J, Piveteau J and Stadler M An efficient fair payment system Proceedings of the 3rd ACM conference on Computer and communications security, (88-94)
  62. Gobioff H, Smith S, Tygar J and Yee B Smart cards in hostile environments Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2, (3-3)
  63. Stadler M Publicly verifiable secret sharing Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques, (190-199)
  64. Jakobsson M Ripping coins for a fair exchange Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques, (220-230)
  65. Brickell E, Gemmell P and Kravitz D Trustee-based tracing extensions to anonymous cash and the making of anonymous change Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms, (457-466)
  66. Sakurai K and Shizuya H Relationships among the computational powers of breaking discrete log cryptosystems Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques, (341-355)
  67. Ferguson N Single term off-line coins Workshop on the theory and application of cryptographic techniques on Advances in cryptology, (318-328)
Contributors
  • Center for Mathematics and Computer Science - Amsterdam

Recommendations