نتایج جستجو برای: untraceability
تعداد نتایج: 141 فیلتر نتایج به سال:
Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart such security and privacy problems, a wide variety of authentication protocols have been proposed in the literature. In 2010, Yeh et al’s proposed a new RFID authentication protocol conforming to ...
How to design a blind signature based on the discrete logarithm for untraceability is still a field in need of cultivation. In this article, we shall propose a new blind signature based on the discrete logarithm problem.
In this article, we show that the Chien et al. s partially blind signature scheme based on RSA public cryptosystem could not meet the untraceability property of a blind signature. 2002 Elsevier Inc. All rights reserved.
We present a taxonomy of attacks on user untraceability in RFID systems. In particular, we consider RFID systems in terms of a layered model comprising a physical layer, a communication layer, and an application layer. We classify the attacks on untraceability according to their layer and discuss their applicability. Our classification includes two new attacks. We first present an attack on the...
appeared in: Proceedings of EUROCRYPT'89, LNCS, Springer-Verlag Heidelberg The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability Michael Waidner, Birgit Pfitzmann Universität Karlsruhe, Postfach 6980 D-7500 Karlsruhe 1, F. R. Germany
The dining cryptographers protocol provides information-theoretically secure sender and recipient untraceability. However, the protocol is considered to be impractical because a malicious participant may disrupt the communication. We propose an implementation which provides information-theoretical security for senders and recipients, and in which a disruptor with limited computational capabilit...
Blind signatures are important techniques and are widely used in many e-commerce services, such as electronic voting and electronic cash system. In this article, we present a blind signature scheme based on elliptic curves cryptography and prove that it satisfies the requirements of blindness, unforgeability and untraceability.
Recently, Fan et al. proposed a novel e-cash scheme which allows a user to recover the e-cash he lost. They claimed their e-cash possesses properties of anonymity, unlinkability (i.e. untraceability), bank-off-line payment, doublespending detection, and anonymity revocation. The ecash untraceability is greatly related to users’ privacy and indicates that no one including the issuer bank can lin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید