Transaction Protection by Beacons

@article{Rabin1983TransactionPB,
  title={Transaction Protection by Beacons},
  author={Michael O. Rabin},
  journal={J. Comput. Syst. Sci.},
  year={1983},
  volume={27},
  pages={256-267}
}
Protocols for implementing contract signing, confidential disclosures, and certified mail in an electronic mail system are proposed. These transactions are provably impossible without a trusted intermediary. However, they can be implemented with just a small probability of a participant cheating his partner, by use of a beacon emitting random integers. Applications include privacy protection of personal information in data banks, as well as the protection of business transactions. 

From This Paper

Topics from this paper.
91 Citations
3 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 91 extracted citations

References

Publications referenced by this paper.
Showing 1-3 of 3 references

RABIN, “Digital Signatures and Public-Key Functions as Intractable as Factorization,

  • MIT/ LCS/TR-212,
  • 1979
3 Excerpts

ADELMAN, A method for obtaining digital signatures and publickey cryptosystems

  • R. L. RIVEST, N. SHAMIR
  • Comm. ACM
  • 1978
3 Excerpts

HELLMAN, New directions in cryptography

  • M.E.W. DIFFIE
  • IEEE Trans. Inform. Theory,
  • 1976
2 Excerpts

Similar Papers

Loading similar papers…