Accession Number : ADA314487

Title :   Anonymous Atomic Transactions,

Corporate Author : CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE

Personal Author(s) : Camp, Jean ; Harkavy, Michael ; Tygar, J. D. ; Yee, Bennet

PDF Url : ADA314487

Report Date : JUL 1996

Pagination or Media Count : 18

Abstract : We show here an example of a protocol that satisfies anonymity properties while providing strong ACID (atomic, consistent, isolated, durable) transactional properties, resolving an open question. Blinded signatures are used to certify an anonymous asymmetric key which authorizes the use of a specified value. A public transaction log is used to support a linear commitment scheme for transactions in which the value authorized by the blind signed key is spent. We show here an example of a protocol that satisfies anonymity properties while providing strong ACID (atomic, consistent, isolated, durable) transactional properties, resolving an open question. Blinded signatures are used to certify an anonymous asymmetric key which authorizes the use of a specified value. A public transaction log is used to support a linear commitment scheme for transactions in which the value authorized by the blind signed key is spent.

Descriptors :   *CRYPTOGRAPHY, *COMPUTER COMMUNICATIONS, DATA BASES, SYSTEMS ENGINEERING, COMMERCE, DATA MANAGEMENT, INFORMATION EXCHANGE, ECONOMIC IMPACT, DISTRIBUTED DATA PROCESSING, DATA PROCESSING SECURITY, CONCURRENT ENGINEERING, COMMUNICATIONS NETWORKS, SYSTEMS ANALYSIS, INTERNET.

Subject Categories : Computer Systems
      Computer Systems Management and Standards

Distribution Statement : APPROVED FOR PUBLIC RELEASE