Financial CryptographySpringer, 2004 - Computer networks |
Contents
Invited Talks | 1 |
A PrivacyFriendly Loyalty System Based on Discrete Logarithms | 24 |
User Authentication | 39 |
Copyright | |
14 other sections not shown
Other editions - View all
Common terms and phrases
adversary algorithm analysis anonymous tunnels assume attacks auction mechanism bidder call center chameleon hash chameleon signature ciphertext cognitive costs collusion detection communication Computer Science cookie correlated correlated equilibrium cover traffic credential certificate cryptographic Cryptology decryption discrete logarithm distribution efficient electronic lottery evaluation value Financial Cryptography hash function homomorphic encryption imdr implementation initiator input Internet Juels key exchange LNCS login loyalty system malicious nodes microcredit micropayment Mixminion MorphMix Nash equilibrium Onion Routing output packets pair parameter Pareto efficient participants party password Peppercoin player probability problem Proc proof of knowledge properties public key QuasiModo trees questions random number recipient requires result Section selection semantically secure senders server signature scheme signer simulator tally Theorem tion transactions unlinkability vector ballot vendor verify Vickrey auction voting write-in