A protocol to provide verifiable proof of identity and unforgeable transaction receipts
- 1 May 1989
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 7 (4) , 435-447
- https://doi.org/10.1109/49.17706
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?)Published by Springer Nature ,2000
- Strong Primes are Easy to FindPublished by Springer Nature ,2000
- Efficient Signature Schemes Based on Polynomial Equations (preliminary version)Published by Springer Nature ,2000
- Zero-Knowledge Proofs of Identity and Veracity of Transaction ReceiptsPublished by Springer Nature ,1988
- An efficient signature scheme based on quadratic equationsPublished by Association for Computing Machinery (ACM) ,1984
- Signatures Through Approximate Representations by Quadratic FormsPublished by Springer Nature ,1984
- A SYSTEM FOR VERIFYING USER IDENTITY AND AUTHORIZATION AT THE POINT-OF SALE OR ACCESSCryptologia, 1984
- Forward Search as a Cryptanalytic Tool Against a Public KeyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- A modification of the RSA public-key encryption procedure (Corresp.)IEEE Transactions on Information Theory, 1980
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978