Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts
- 1 January 1988
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- The Subliminal Channel and Digital SignaturesPublished by Springer Nature ,2000
- Efficient Signature Schemes Based on Polynomial Equations (preliminary version)Published by Springer Nature ,2000
- An Impersonation-Proof Identity Verification SchemePublished by Springer Nature ,1988
- An efficient solution of the congruencex^2 + ky^2 = mpmod{n}IEEE Transactions on Information Theory, 1987
- An efficient signature scheme based on quadratic equationsPublished by Association for Computing Machinery (ACM) ,1984
- A SYSTEM FOR VERIFYING USER IDENTITY AND AUTHORIZATION AT THE POINT-OF SALE OR ACCESSCryptologia, 1984
- A modification of the RSA public-key encryption procedure (Corresp.)IEEE Transactions on Information Theory, 1980
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A high security log-in procedureCommunications of the ACM, 1974
- Computational problems associated with Racah algebraJournal of Computational Physics, 1967