An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
We have introduced the first electronic cash scheme with unconditional security. That is, even malicious users with unlimited computational ability cannot, forge a coin and cannot change user's identity secretly embedded in each coin. While, the spender's anonymity is preserved by our new blind signature scheme based on unconditionally secure signature proposed in[7]. But the anonymity is preserved only computationally under the assumption that Decisional Diffie-Hellman Problem is intractable.
- 社団法人電子情報通信学会の論文
- 2002-01-01
著者
-
Otsuka A
Ipa Tokyo Jpn
-
IMAI Hideki
the Institute of Industrial Science, The University of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Shikata Junji
Graduate School Of Environment And Information Sciences Yokohama National University
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
SHIKATA Junji
Dept. of Electrical and computer Engineering, Yokohama National University
-
OTSUKA Akira
the Institute of Industrial Science, The University of Tokyo
-
HANAOKA Goichiro
the Institute of Industrial Science, The University of Tokyo
-
SHIKATA Junji
the Institute of Industrial Science, The University of Tokyo
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Imai Hideki
The Institute Of Industrial Science The University Of Tokyo
-
Shikata Junji
Dept. Of Electrical And Computer Engineering Yokohama National University
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Tradeoffs between Error Performance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding
- Unconditionally Secure Chaffing-and-Winnowing
- Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
- The MAC-based Construction of Strong Multiple Encryption
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Towards Removing Random Oracles from OAEP
- Asymptotic Bounds for Unidirectional Byte Error-Correcting Codes (Special Section on Information Theory and Its Applications)
- Construction Techniques for Error-Control Runlength-Limited Block Codes
- On Strictly Geometrically Uniform Codes: Construction and New Codes
- Unconditionally Secure Group Signatures
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher(Special Section on Cryptography and Information Security)
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On Evaluating the Entropy of Graphical Passwords
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- Coded Modulation for Satellite Digital Video Broadcasting (Special Section on Information Theory and Its Applications)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Semantically Secure McEliece Phblic-Key Cryptosystem(Special Section on Cryptography and Information Security)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Efficient Provider Authentication for Bidirectional Broadcasting Service
- A Trade-off Traitor Tracing Scheme
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Multi-Dimensional Turbo Codes: Performance and Simplified Decoding Structure
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Reliability-Based Decoding Algorithm in Multistage Decoding of Multilevel Codes(Special Section on Information Theory and Its Applications)
- Secure Broadcast System with Simultaneous Individual Messaging
- A Fast Automatic Fingerprint Identification Method Based on a Weighted-Mean of Binary Image (Special Section on Information Theory and Its Applications)
- Viterbi Decoding Considering Synchronization Errors (Special Section on Information Theory and Its Applications)