Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published December 1996 | Published
Journal Article Open

Anonymous credit cards and their collusion analysis


Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol.

Additional Information

© 1996 IEEE. Manuscript received September 14, 1993, revised October 14, 1994 and January 3, 1996, approved by IEEE/ACM Transactions on Networking, Editor S. S. Lam.

Attached Files

Published - LOWieeeacmtn96.pdf


Files (1.2 MB)
Name Size Download all
1.2 MB Preview Download

Additional details

August 22, 2023
August 22, 2023