Wallet Databases with Observers

نویسندگان

  • David Chaum
  • Torben P. Pedersen
چکیده

Previously there have been essentially on!? t\vo models for computers t h a t people can use to handle ordinary consumer transactions: <i:i :he tamper-proof module, such as a smart card, that the person cannot modify or probe; and ( 2 ) the personal workstation whose inner working is totally under control of the individual. The first par t of this article argues that a particular combination of these two kinds of mechanism can overcome the limitations of each alone. providing both security and correctness for organizations as Ivell as privacy and even anonymity for individuals. Then it is shown horn this conihined device. called a wailet. r a n carry a. dat.a.base containing personal information. The construction presenred ensures that no single part of the device (i.e. neither the yamper-proof part nor the xvorkstat.ion) can learn the contents of t h e database thls information can only he recovered by the tLvo parts together.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applied Batch Cryptography

. In S. Goldwasser, editor, Advances in Cryptology − CRYPTO ‘88, Springer-Verlag, Vol. 403, LNCS, pp.319-327, 1988.[CP92] D. Chaum and T. Pedersen. Wallet databases with observers (extendedabstract). In E. Brickell, editor, Advances in Cryptology − CRYPTO ‘92, Springer-Verlag, Vol. 740, LNCS, pp.89-105, 1992.[CH91] D. Chaum, and E. Van Heyst. Group Signatures. In D. Davies, editor,<...

متن کامل

Empirical Study on Usability Impact Factors of Electronic Wallet-One Card Solution within College Students

Empirical study on usability impact factors of electronic wallet-one card solution within college students includes the analysis of the current situation within the electronic wallet-one card solution for college students, the analysis of behavior habit within using the electronic wallet-one card solution for college students, and sets up a preliminary usability evaluation indicator system of e...

متن کامل

Risk Management for E-Cash Systems with Partial Real-Time Audit

We analyze “coin-wallet” and “balance-wallet” under partial real-time audit, and compute upper bounds on theft due to the fact that not all the transactions are audited in real time, assuming that everything else is perfect. In particular, we assume that the audit regime holds for innocent payees. Let v be the maximum allowed balance in a wallet, and 0 μ 1 be the fraction of transactions that a...

متن کامل

Parasitic Authentication To Protect Your E-Wallet

T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...

متن کامل

Parasitic authentication to protect your E-wallet - Computer

T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia’s 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1992