نتایج جستجو برای: untraceability

تعداد نتایج: 141  

Journal: :IACR Cryptology ePrint Archive 2010
Tzu-Chang Yeh Yanjun Wang Tsai-Chi Kuo Sheng-Shih Wang

Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart such security and privacy problems, a wide variety of authentication protocols have been proposed in the literature. In 2010, Yeh et al’s proposed a new RFID authentication protocol conforming to ...

Journal: :Applied Mathematics and Computation 2005
Cheng-Chi Lee Min-Shiang Hwang Wei-Pang Yang

How to design a blind signature based on the discrete logarithm for untraceability is still a field in need of cultivation. In this article, we shall propose a new blind signature based on the discrete logarithm problem.

Journal: :DEStech Transactions on Computer Science and Engineering 2019

Journal: :Applied Mathematics and Computation 2003
Min-Shiang Hwang Cheng-Chi Lee Yan-Chi Lai

In this article, we show that the Chien et al. s partially blind signature scheme based on RSA public cryptosystem could not meet the untraceability property of a blind signature. 2002 Elsevier Inc. All rights reserved.

2010
Ton van Deursen

We present a taxonomy of attacks on user untraceability in RFID systems. In particular, we consider RFID systems in terms of a layered model comprising a physical layer, a communication layer, and an application layer. We classify the attacks on untraceability according to their layer and discuss their applicability. Our classification includes two new attacks. We first present an attack on the...

2010
Michael Waidner Birgit Pfitzmann

appeared in: Proceedings of EUROCRYPT'89, LNCS, Springer-Verlag Heidelberg The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability Michael Waidner, Birgit Pfitzmann Universität Karlsruhe, Postfach 6980 D-7500 Karlsruhe 1, F. R. Germany

2014
Christian Franck Jeroen van de Graaf

The dining cryptographers protocol provides information-theoretically secure sender and recipient untraceability. However, the protocol is considered to be impractical because a malicious participant may disrupt the communication. We propose an implementation which provides information-theoretical security for senders and recipients, and in which a disruptor with limited computational capabilit...

2012
Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung

Blind signatures are important techniques and are widely used in many e-commerce services, such as electronic voting and electronic cash system. In this article, we present a blind signature scheme based on elliptic curves cryptography and prove that it satisfies the requirements of blindness, unforgeability and untraceability.

Journal: :I. J. Network Security 2015
Yalin Chen Jue-Sam Chou

Recently, Fan et al. proposed a novel e-cash scheme which allows a user to recover the e-cash he lost. They claimed their e-cash possesses properties of anonymity, unlinkability (i.e. untraceability), bank-off-line payment, doublespending detection, and anonymity revocation. The ecash untraceability is greatly related to users’ privacy and indicates that no one including the issuer bank can lin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید