Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Digital payment systems with passive anonymity-revoking trustees
Journal of Computer Security
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Proceedings of the 11th ACM conference on Computer and communications security
CNSR '05 Proceedings of the 3rd Annual Communication Networks and Services Research Conference
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
Proceedings of the first ACM workshop on Scalable trusted computing
A practical guide to trusted computing
A practical guide to trusted computing
An ID-based Transferable Off-line E-Cash System with Revokable Anonymity
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
Anonymous Fair Transaction Protocols Based on Electronic Cash
International Journal of Electronic Commerce
Remote Electronic Voting with Revocable Anonymity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Transferable Constant-Size Fair E-Cash
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Basing cryptographic protocols on tamper-evident seals
Theoretical Computer Science
Offline payments with auditable tracing
FC'02 Proceedings of the 6th international conference on Financial cryptography
Escrowed data and the digital envelope
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
An Off-line Electronic Cash Scheme Based on Proxy Blind Signature
The Computer Journal
True trustworthy elections: remote electronic voting using trusted computing
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
A novel electronic cash system with trustee-based anonymity revocation from pairing
Electronic Commerce Research and Applications
Hi-index | 0.00 |
In this paper, we discuss a protocol allowing the remote user of a system providing revocable anonymity to be assured of whether or not her anonymity is revoked. We achieve this via a novel use of Trusted Computing and Virtual Monotonic Counters. The protocol has wide-ranging scope in a variety of computer security fields, such as electronic cash, fair exchange and electronic voting.