Wallet Databases with Observers
نویسندگان
چکیده
Previously there have been essentially on!? t\vo models for computers t h a t people can use to handle ordinary consumer transactions: <i:i :he tamper-proof module, such as a smart card, that the person cannot modify or probe; and ( 2 ) the personal workstation whose inner working is totally under control of the individual. The first par t of this article argues that a particular combination of these two kinds of mechanism can overcome the limitations of each alone. providing both security and correctness for organizations as Ivell as privacy and even anonymity for individuals. Then it is shown horn this conihined device. called a wailet. r a n carry a. dat.a.base containing personal information. The construction presenred ensures that no single part of the device (i.e. neither the yamper-proof part nor the xvorkstat.ion) can learn the contents of t h e database thls information can only he recovered by the tLvo parts together.
منابع مشابه
Applied Batch Cryptography
. In S. Goldwasser, editor, Advances in Cryptology − CRYPTO ‘88, Springer-Verlag, Vol. 403, LNCS, pp.319-327, 1988.[CP92] D. Chaum and T. Pedersen. Wallet databases with observers (extendedabstract). In E. Brickell, editor, Advances in Cryptology − CRYPTO ‘92, Springer-Verlag, Vol. 740, LNCS, pp.89-105, 1992.[CH91] D. Chaum, and E. Van Heyst. Group Signatures. In D. Davies, editor,<...
متن کاملEmpirical Study on Usability Impact Factors of Electronic Wallet-One Card Solution within College Students
Empirical study on usability impact factors of electronic wallet-one card solution within college students includes the analysis of the current situation within the electronic wallet-one card solution for college students, the analysis of behavior habit within using the electronic wallet-one card solution for college students, and sets up a preliminary usability evaluation indicator system of e...
متن کاملRisk Management for E-Cash Systems with Partial Real-Time Audit
We analyze “coin-wallet” and “balance-wallet” under partial real-time audit, and compute upper bounds on theft due to the fact that not all the transactions are audited in real time, assuming that everything else is perfect. In particular, we assume that the audit regime holds for innocent payees. Let v be the maximum allowed balance in a wallet, and 0 μ 1 be the fraction of transactions that a...
متن کاملParasitic Authentication To Protect Your E-Wallet
T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...
متن کاملParasitic authentication to protect your E-wallet - Computer
T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia’s 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...
متن کامل