A Caltech Library Service

Anonymous credit cards and their collusion analysis

Low, Steven L. and Maxemcheuk, Nicholas F. and Paul, Sanjoy (1996) Anonymous credit cards and their collusion analysis. IEEE/ACM Transactions on Networking, 4 (6). pp. 809-816. ISSN 1063-6692.

See Usage Policy.


Use this Persistent URL to link to this item:


Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol.

Item Type:Article
Additional Information:© Copyright 1996 IEEE. Reprinted with permission. Manuscript received September 14, 1993, revised October 14, 1994 and January 3, 1996, approved by IEEE/ACM TRANSACTIONONS NETWORKING Editor S S Lam.
Subject Keywords:anonymous credit card protocol, collusion analysis, communications networks, cryptographic protocol, personal privacy
Record Number:CaltechAUTHORS:LOWieeeacmtn96
Persistent URL:
Alternative URL:
Usage Policy:No commercial reproduction, distribution, display or performance rights in this work are provided.
ID Code:8583
Deposited By: Archive Administrator
Deposited On:21 Aug 2007
Last Modified:26 Dec 2012 09:40

Repository Staff Only: item control page