On blind signatures and perfect crimes
Computers and Security
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Efficient scalable fair cash with off-line extortion prevention
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Auditable, Anonymous Electronic Cash Extended Abstract
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the International Workshop on Security Protocols
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Improved Magic Ink Signatures Using Hints
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Hi-index | 0.00 |
Anonymous electronic cash systems can be vulnerable to criminal abuse. Two approaches were suggested for solving this problem. In an escrowed cash system users are given anonymity which can be lifted by trustees. In an amount-limited system each user enjoys unconditional anonymity but only for payments up to a limited amount during a given time-frame. In this paper we discuss the two approaches.