Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers.Expand
The solution presented here is unconditionally or cryptographically secure, depending on whether it is based on one-time-use keys or on public keys.Expand
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.Expand
A combination of tamper-proof and personal workstation can overcome the limitations of each alone, providing both security and correctness for organizations as well as privacy and even anonymity for individuals.Expand
An electronic cash protocol including the steps of using a one-way function f1 to generate an image f1 (x1) from a preimage x1 ; sending the image in an unblinded form to a second party; and receiving a note including a digital signature, wherein the note represents a commitment by the second party to credit a predetermined amount of money to a first party.Expand
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.Expand
The distance bounding technique we introduce solves this problem by timing the delay between sending out a challenge bit and receiving back the corresponding response bit.Expand
Under the assumption that each pair can communicate secretly, we show that any reasonable multiparty protocol can be achieved if at least 2n/3 of the participants are honest.Expand