Proposal for New E-cash System Using Message Recovery Signature (特集 情報セキュリティの理論と応用)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we have examined the actual problem in the e-cash system (Nguyen, et al.1998), and then proposed a new untraceable off-line e-cash system with the feature of Nyberg-Rueppel Signature (1993 ; 1995), which provides message recovery. Moreover, we have estimated the security in our e-cash system from the viewpoints of completeness, user's privacy in the payment, forgery of coins and double-spending detection. Considering the cost of communication and computation, our system is more efficient than other e-cash systems (Brands 1994 ; Ferguson 1994).
- 一般社団法人情報処理学会の論文
- 2000-08-15
著者
-
Okamoto Eiji
University Of Tsukuba
-
Okamoto E
Institute Of Information Sciences And Electronics University Of Tsukuba
-
Tada Mitsuru
School Of Information Science Japan Advanced Institute Of Science And Teclmology
-
HIROHASHI KOJI
PFU Limited
-
Okamoto Eiji
Department Of Computer Science And Engineering Nagoya Institute Of Technology
関連論文
- The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem (Applications) (Cryptography and Information Security)
- The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem
- Proposal of an Automatic Signature Scheme Using a Compiler (Special Section on Cryptography and Information Security)
- Permutation Cipher Scheme Using Polynomials over a Field
- On the Σ^b_1-Definability of Integer Factoring
- Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications)
- Proposal for New E-cash System Using Message Recovery Signature (特集 情報セキュリティの理論と応用)
- Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
- Application of Wavelet Packet Modulation to Mobile Communication(Wide Band Systems)
- Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study
- Special Section on Discrete Mathematics and Its Applications
- An Approach to Perform Quantitative Information Security Risk Assessment in IT Landscapes
- Detection of Unexpected Services and Communication Paths in Networked Systems
- Detection of Unexpected Services and Communication Paths in Networked Systems