Back to Results
First PageMeta Content
XDH assumption / Decisional Diffie–Hellman assumption / Electronic money / Public-key cryptography / Proof of knowledge / XTR / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange


Practical Anonymous Divisible E-Cash From Bounded Accumulators? Man Ho Au, Willy Susilo, and Yi Mu Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of W
Add to Reading List

Document Date: 2007-12-09 02:25:32


Open Document

File Size: 335,19 KB

Share Result on Facebook

Company

G1 / B. / G2 / /

/

Event

Product Recall / Product Issues / FDA Phase / /

Facility

Software Engineering University of Wollongong / /

Holiday

Assumption / /

IndustryTerm

generation algorithm / particular withdrawal protocol / deposit protocols / cryptographic tools / deposit protocol / account establishment protocol / less efficient withdrawal protocol / knowledge protocol / cyclic / signature generation protocol / bank / signature possession protocol / e-cash systems / polynomial time algorithms/protocols / e-cash / pre-processing / withdrawal protocol / /

Organization

University of Wollongong / Yi Mu Centre for Computer / Computer and Information Security Research School of Computer Science / /

Person

Ni / Ho Au / Bob / /

Product

2L coins / protocol every two withdrawal requests / request / Procedure / wallet / Canard / RevokeDoubleSpender / protocol / wallet containing 2L coins / 2` / 2L2L / ESS+ Signature / M. To / ESS / /

Technology

deposit protocols / signature generation protocol / account establishment protocol / signing protocol / SDH / two protocols / secret key / RevokeDoubleSpender algorithm / signature possession protocol / former protocol / particular withdrawal protocol / PPT algorithm / deposit protocol / public key / spending protocol / withdrawal protocol / seven polynomial time algorithms/protocols / The generation algorithm / knowledge protocol / /

SocialTag