Abstract
When analysing the security of electronic cash systems [1,3] one comes up with a question concerning RSA signatures. The question arises when looking at the cut and choose method of the withdrawal protocol. Previous results [2] cannot be applied. Using some assumptions this problem is solved.
| Original language | English |
|---|---|
| Title of host publication | IEEE International Symposium on Information Theory 1993 |
| Subtitle of host publication | Proceedings |
| Place of Publication | Los Alamitos, CA |
| Publisher | IEEE |
| Pages | 235-235 |
| Number of pages | 1 |
| ISBN (Print) | 0-7803-0878-6 |
| DOIs | |
| Publication status | Published - 22 Jan 1993 |
| Externally published | Yes |
| Event | IEEE International Symposium on Information Theory, ISIT 1993 - San Antonio, United States Duration: 17 Jan 1993 → 22 Jan 1993 |
Conference
| Conference | IEEE International Symposium on Information Theory, ISIT 1993 |
|---|---|
| Abbreviated title | ISIT |
| Country/Territory | United States |
| City | San Antonio |
| Period | 17/01/93 → 22/01/93 |
Keywords
- Protocols
- Communication system security
- Information security
- Protection
- Privacy