Security without identification: transaction systems to make big brother obsolete

@article{Chaum1985SecurityWI,
  title={Security without identification: transaction systems to make big brother obsolete},
  author={David Chaum},
  journal={Commun. ACM},
  year={1985},
  volume={28},
  pages={1030-1044}
}
  • D. Chaum
  • Published 1 October 1985
  • Computer Science
  • Commun. ACM
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. 

Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms

The techniques presented allow powerful, readily extensible, and flexible arrangements for exchange of information between organizations about individuals. They protect against abuses by individuals,

Novel security techniques for online systems

By ensuring entry to subsystems (zones) with different facilities and security levels, log-in procedures can do more than simply delay illicit access.

Privacy and Identity Management for Life

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best

A formal approach toward authenticated authorization without identification

A formal approach toward authenticated authorization without identification is proposed for the first time in this context.

Anonymity and Security Support for Persistent Enterprise Conversation

This paper proposes an anonymous and secure conversation protocol based on a concept of alias certificate with analysis to show that the scheme satisfies such requirements.

A Risk Driven Approach to Designing Privacy Enhanced Secure

In the context of authorization in distributed systems, security and privacy often seem at odds; the need to identify misbehaving users calls for either identity-based authorization or identity escrow allowing re-identification of users.

An Efficient Electronic Payment System Protecting Privacy

This paper presents a practical anonymous payment system that significantly reduces the size of large databases and uses the concept of anonymous accounts and offers anonymity as an add-on feature to existing EFTPOS systems.

Threats and countermeasures for network security

In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors.

A Cryptographic Framework for the Controlled Release of Certified Data

This talk is actually about what cryptographics can do for mass protection and real world cryptographic techniques to control the release of certified data.

Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world]

This thesis focusses on the cryptographic and broader technical challenges of applying ABCs in identity management, both online and offline.
...

References

SHOWING 1-5 OF 5 REFERENCES

New directions in cryptography

This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

A method for obtaining digital signatures and public-key cryptosystems

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.

The rise of the computer state

Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. Available from the author

  • Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. Available from the author

Privacy protected payments: Unconditional payer and/or payee untraceability. Available from the author

  • Privacy protected payments: Unconditional payer and/or payee untraceability. Available from the author