scispace - formally typeset
C

Christina Garman

Researcher at Purdue University

Publications -  29
Citations -  3469

Christina Garman is an academic researcher from Purdue University. The author has contributed to research in topics: Computer science & Cryptography. The author has an hindex of 13, co-authored 22 publications receiving 2668 citations. Previous affiliations of Christina Garman include Johns Hopkins University & Massachusetts Institute of Technology.

Papers
More filters
Proceedings ArticleDOI

Zerocash: Decentralized Anonymous Payments from Bitcoin

TL;DR: This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.
Proceedings ArticleDOI

Zerocoin: Anonymous Distributed E-Cash from Bitcoin

TL;DR: Zerocoin is proposed, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions and uses standard cryptographic assumptions and does not introduce new trusted parties or otherwise change the security model of Bitcoin.
Journal ArticleDOI

Charm: a framework for rapidly prototyping cryptosystems

TL;DR: Charm as discussed by the authors is an extensible framework for rapidly prototyping cryptographic systems, including support for modular composition of cryptographic building blocks, infrastructure for developing interactive protocols, and an extensive library of re-usable code.
Posted Content

Zerocash: Decentralized Anonymous Payments from Bitcoin.

TL;DR: In this paper, Wang et al. proposed a decentralized anonymous payment scheme (DAP) scheme, which enables users to directly pay each other privately: the corresponding transaction hides the payment's origin, destination, and transferred amount.
Proceedings ArticleDOI

Decentralized Anonymous Credentials

TL;DR: This work proposes a novel anonymous credential scheme that eliminates the need for a trusted credential issuer and provides a proof of security for a basic anonymous credential system that allows users to make flexible identity assertions with strong privacy guarantees without relying on trusted parties.