Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
A secure and privacy-protecting protocol for transmitting personal information between organizations
Proceedings on Advances in cryptology---CRYPTO '86
Smart card, a highly reliable and portable security device
Proceedings on Advances in cryptology---CRYPTO '86
Design and validation of computer protocols
Design and validation of computer protocols
Internetworking with TCP/IP (2nd ed.), vol. I
Internetworking with TCP/IP (2nd ed.), vol. I
Online minimization of transition systems (extended abstract)
STOC '92 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Reachability and Recurrence in Extended Finite State Machines: Modular Vector Addition Systems
CAV '93 Proceedings of the 5th International Conference on Computer Aided Verification
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
An efficient fair payment system
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 4th ACM conference on Computer and communications security
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Loyalty Program Scheme for Anonymous Payment System
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Classification and Characteristics of Electronic Payment Systems
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
SAC '98 Proceedings of the Selected Areas in Cryptography
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Mini-Cash: A Minimalistic Approach to E-Commerce
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
An Algorithm to Compute Collusion Paths
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
ACM SIGecom Exchanges
Towards Pseudonymous e-Commerce
Electronic Commerce Research
Electronic commerce and the street performer protocol
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Token and notational money in electronic commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
An Anonymous Credit Card System
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases
Marketing Science
Hi-index | 0.00 |
This paper describes a communications networking technique for funds transfer which combines the privacy of cash transactions with the security, record-keeping and charging mechanisms of credit cards. The scheme uses a communications network and cryptographic protocols to separate information. The company that extends credit to the individual and collects the bill does not have access to the specific purchases, and the shop that sells the merchandise is convinced that it will be paid without learning the individual's identity.The information is separated to make it difficult to associate an individual with his purchases. Analysis of the information separation in this system shows that five parties must collude to associate an individual's identity and purchases. If an individual deposits cash into the system, rather than asking for credit, then none of the parties need to know his identity. Complete anonymity is obtained while retaining the security against loss or theft and the record keeping capabilities of credit cards.