Summary
Payment systems and credential mechanisms are protocols allowing individuals to conduct a wide range of financial and social activities wide preventing even infinitely powerful and cooperating organizations from monitoring these activities. These concepts were invented and first studied by David Chaum.
This research was supported by the Danish Natural Science Research Council.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bellare and Micali: “How to Sign Given any Trapdoor Function”, these proceedings.
Chaum: “Privacy Protected Payments”, Preprint., available from author.
Chaum: Private communication.
Chaum: “Elections with Unconditionally Secret Ballots and Disruption Equivalent to Breaking RSA”, to appear in Proc. of EuroCrypt 88.
Chaum, Damgård, van de Graaf, “Multiparty Computations Ensuring Privacy of each Party’s Input and Correctness of the Result”, Proc. of Crypto 87, Springer.
Chaum and Evertse: “A Secure and Privacy Protecting Protocol for Transmitting Personal Information Between Organizations”, Proc. of Crypto 86, Springer.
Damgård: “The Application of Claw Free Functions in Cryptography; Unconditional Protection in Cryptographic Protocols”, phd.-thesis, Aarhus University, 1988.
Desmedt: “Special Uses and Abuses of the Fiat-Shamir Passport Protocol”, Proc. of Crypto 87, Springer.
Goldwasser, Micali and Rivest: “A Paradoxical Solution to the Signature Problem”, Proc. of FOCS 84, pp.441–448.
Goldreich, Micali and Wigderson: “How to Play Any Mental Game”, proc. of FOCS 87.
Yao: “How to Generate an Exchange Secrets”, proc. of FOCS 86.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Damgård, I.B. (1990). Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. In: Goldwasser, S. (eds) Advances in Cryptology — CRYPTO’ 88. CRYPTO 1988. Lecture Notes in Computer Science, vol 403. Springer, New York, NY. https://doi.org/10.1007/0-387-34799-2_26
Download citation
DOI: https://doi.org/10.1007/0-387-34799-2_26
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97196-4
Online ISBN: 978-0-387-34799-8
eBook Packages: Springer Book Archive