- 1 Baran, P. On distributed communications: IX security secrecy and tamper-free considerations. Memo RM-3765-PR, Rand Corp., Santa Monica, CA, Aug. 1964.Google Scholar
- 2 Diffie,W. and Hellman, M.E. New directions in cryptography. IEEE Trans. Information Theory 1T-22, 6 (Nov. 1976), 644-654.Google ScholarDigital Library
- 3 Kahn, D. The Code Breakers, The Story of Secret Writing. Macmillan, New York, 1967.Google Scholar
- 4 Merkle, R.C. Secure communications over insecure channels. Comm. ACM 21, 4 (Apt. 1978), 294-299. Google ScholarDigital Library
- 5 Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1977), 120-126. Google ScholarDigital Library
Index Terms
- Untraceable electronic mail, return addresses, and digital pseudonyms
Recommendations
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to ...
A method for obtaining digital signatures and public-key cryptosystems
Special 25th Anniversary IssueAn encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences:
- Couriers or other secure means are not needed to transmit ...
Disposable zero-knowledge authentications and their applications to untraceable electronic cash
CRYPTO '89: Proceedings on Advances in cryptologyIn this paper, we propose a new type of authentication system, disposable zero-knowledge authentication system. Informally speaking, in this authentication system, double usage of the same authentication is prevented. Based on these disposable zero-...
Comments