Security without identification: transaction systems to make big brother obsolete
@article{Chaum1985SecurityWI, title={Security without identification: transaction systems to make big brother obsolete}, author={David Chaum}, journal={Commun. ACM}, year={1985}, volume={28}, pages={1030-1044} }
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
1,705 Citations
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms
- Computer ScienceEUROCRYPT
- 1985
The techniques presented allow powerful, readily extensible, and flexible arrangements for exchange of information between organizations about individuals. They protect against abuses by individuals,…
Novel security techniques for online systems
- Computer ScienceCACM
- 1986
By ensuring entry to subsystems (zones) with different facilities and security levels, log-in procedures can do more than simply delay illicit access.
Privacy and Identity Management for Life
- BusinessIFIP Advances in Information and Communication Technology
- 2011
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best…
A formal approach toward authenticated authorization without identification
- Computer Science
- 2008
A formal approach toward authenticated authorization without identification is proposed for the first time in this context.
Anonymity and Security Support for Persistent Enterprise Conversation
- Computer Science2006 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06)
- 2006
This paper proposes an anonymous and secure conversation protocol based on a concept of alias certificate with analysis to show that the scheme satisfies such requirements.
A Risk Driven Approach to Designing Privacy Enhanced Secure
- Computer ScienceInternational Information Security Workshops
- 2004
In the context of authorization in distributed systems, security and privacy often seem at odds; the need to identify misbehaving users calls for either identity-based authorization or identity escrow allowing re-identification of users.
Threats and countermeasures for network security
- Computer Science
- 1991
In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors.…
A Cryptographic Framework for the Controlled Release of Certified Data
- Computer Science, MathematicsSecurity Protocols Workshop
- 2004
This talk is actually about what cryptographics can do for mass protection and real world cryptographic techniques to control the release of certified data.
Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world]
- Computer Science
- 2015
This thesis focusses on the cryptographic and broader technical challenges of applying ABCs in identity management, both online and offline.
A Non-Iterative Electronic Cash System
- Computer ScienceCIAC
- 1994
The first electronic cash system whose transactions require no interaction between the parties is given, based on the computational intractability of factoring Blum integers.
References
SHOWING 1-5 OF 5 REFERENCES
New directions in cryptography
- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1976
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
A method for obtaining digital signatures and public-key cryptosystems
- Computer Science, MathematicsCACM
- 1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. Available from the author
- Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. Available from the author
Privacy protected payments: Unconditional payer and/or payee untraceability. Available from the author
- Privacy protected payments: Unconditional payer and/or payee untraceability. Available from the author