Low, Steven L. and Maxemcheuk, Nicholas F. and Paul, Sanjoy (1996) Anonymous credit cards and their collusion analysis. IEEE/ACM Transactions on Networking, 4 (6). pp. 809-816. ISSN 1063-6692 http://resolver.caltech.edu/CaltechAUTHORS:LOWieeeacmtn96
See Usage Policy.
Use this Persistent URL to link to this item: http://resolver.caltech.edu/CaltechAUTHORS:LOWieeeacmtn96
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol.
|Additional Information:||© Copyright 1996 IEEE. Reprinted with permission. Manuscript received September 14, 1993, revised October 14, 1994 and January 3, 1996, approved by IEEE/ACM TRANSACTIONONS NETWORKING Editor S S Lam.|
|Subject Keywords:||anonymous credit card protocol, collusion analysis, communications networks, cryptographic protocol, personal privacy|
|Usage Policy:||No commercial reproduction, distribution, display or performance rights in this work are provided.|
|Deposited By:||Archive Administrator|
|Deposited On:||21 Aug 2007|
|Last Modified:||26 Dec 2012 09:40|
Repository Staff Only: item control page