Topic
Electronic cash
About: Electronic cash is a research topic. Over the lifetime, 896 publications have been published within this topic receiving 17355 citations.
Papers published on a yearly basis
Papers
More filters
Patent•
29 Aug 1996TL;DR: An electronic cash protocol including the steps of using a one-way function f1 to generate an image f1 (x1) from a preimage x1 and receiving from the second party a note including a digital signature.
Abstract: An electronic cash protocol for transactions that are typically between a customer (10), a vendor (20), and a bank (30) including the steps of using a one-way function f1(x) to generate an image f1(x) from a preimage x1; sending the image f1(x1) in an inblinded form to a second party, and receiving from the second party a note including a digital signature, wherein the note represents a commitment by the second party to credit a predetermined amount of money to a first presenter of the preimage x1 to the second party.
1,202 citations
01 Feb 1990
TL;DR: The use of credit cards today is an act of faith on the p a t of all concerned as discussed by the authors, and each party is vulnerable to fraud by the others, and the cardholder in particular has no protection against surveillance.
Abstract: The use of credit cards today is an act of faith on the p a t of all concerned. Each party is vulnerable to fraud by the others, and the cardholder in particular has no protection against surveillance.
1,031 citations
02 Jan 1994
TL;DR: The electronic cash scheme in [Fer93a] can be extended to provide n-spendable coins and observers can be incorporated in the protocols to provide prior restraint against double spending by the user, instead of just detection after the fact.
Abstract: Incorporating the property of untraceability of payments into off-line electronic cash systems has turned out to be no easy matter. Two key concepts have been proposed in order to attain the same level of security against double-spending as can be trivially attained in systems with full traceability of payments.
649 citations
01 Sep 2000
TL;DR: In this paper, Brand proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security, such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that.
Abstract: From the Publisher:
As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.
637 citations
Patent•
15 Dec 1995
TL;DR: Smart token technology, using a smart card, PCMCIA card or any other medium containing storage or processing capability is used to facilitate a variety of secure business transactions, including those which might occur over an unsecured network such as the Internet.
Abstract: Smart token technology, using a smart card, PCMCIA card or any other medium containing storage or processing capability is used to facilitate a variety of secure business transactions, including those which might occur over an unsecured network such as the Internet. Application programs can obtain a variety of smart token services using a common application programming interface. Applications of the smart token technology to electronic cash, banking, credit, computer and network access, software distribution, medical handling and issuance of credentials are presented.
380 citations