The Use of Public-Key Cryptography for Signing Checks
We want to build a secure system in which customers of a bank can make transactions and be able to keep a proof of each transaction. We also want the system to satisfy (as far as possible) the following constraints (our ultimate purpose is to remove all physical money):
the customers are able to make transactions over the phone (just by exchanging messages),
no communication with the bank is required for a transaction,
no directory of customers is available.
KeywordsSequence Number Check Form Electronic Money Bank Certificate Official Amount
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- Longpré, L., “Etude des applications de la cryptographie à clef publique”, Mémoire de maitrise, Université de Montréal, Département d’informatique et de recherche operationnelle, Août 81.Google Scholar
- Diffie, W. and Hellman, M.E., “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol. IT-22, Nov. 1976, pp. 644–654.Google Scholar
- Blum, M., “How to Exchange (Secret) Keys”, Memorandum No. UCB/ERL M81 /90, March 1982.Google Scholar
- Even, S., Goldreich, O., and Lempel, A., “A Randomized Protocol for Signing Contracts”, Technical Report #233, TECHNION Israel Institute of Technology, Feb 1982.Google Scholar
- Rabin, M.O., “Transaction Protection by Beacons”, Doc. TR-29–81, November 1981, Aiken Computation Laboratory, Harvard University.Google Scholar
© Springer Science+Business Media New York 1983