Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
This paper describes an extension of the Brands protocol to incorporate flexibly-divisble k-term Coins via application of Shamir polynomial parameterisation and Feldman-Pedersen zero knowledge (ZK) verification. User anonymity is preserved for up to k sub-Coin Payments per k-term Coin, but revoked f...
| Main Authors: | Goh,, A, Ngo,, DCL, Yip, , KW |
|---|---|
| Format: | Article |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2613/ |
Similar Items
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
The coinage of Atrebates and Regni
by: Bean, Simon C.
Published: (1994)
by: Bean, Simon C.
Published: (1994)
Design of Stable Circularly Symmetric Two-Dimensional GIC Digital Filters Using PLSI Polynomials
by: Gnanamuthu, Ezra Morris Abraham, et al.
Published: (2007)
by: Gnanamuthu, Ezra Morris Abraham, et al.
Published: (2007)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Textured Renyl Entropy for Image Thresholding
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Biodiversity of Andaman and Nicobar Islands in fantasy coinage
by: Das, I.
Published: (2017)
by: Das, I.
Published: (2017)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header).
by: Supriyanto, Supriyanto, et al.
Published: (2009)
by: Supriyanto, Supriyanto, et al.
Published: (2009)
Detection of cracked digitized paintings and manuscripts
based on threshold techniques
by: abdulwahab, Nawafil, et al.
Published: (2019)
by: abdulwahab, Nawafil, et al.
Published: (2019)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
TEMPORAL VIDEO COMPRESSION USING MODE FACTOR AND POLYNOMIAL FITTING ON WAVELET COEFFICIENTS
by: Devi, TN, et al.
Published: (2009)
by: Devi, TN, et al.
Published: (2009)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
CST337 – Network Configurations And Protocols
(Konfigurasi Dan Protokol Rangkaian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CST337 – Network configuration and protocols (Konfigurasi dan protokol rangkaian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Moneyers of the late Anglo-Saxon coinage, 1016-1042
by: Smart, Veronica
Published: (1981)
by: Smart, Veronica
Published: (1981)
The Tyche of Berytus: a Phoenician goddess on civic coinage.
by: Kropp, Andreas
Published: (2015)
by: Kropp, Andreas
Published: (2015)
A Framework For Flexible Data Consistency In Collaborative Editing
by: Omar , Mohd Adib
Published: (2009)
by: Omar , Mohd Adib
Published: (2009)
Semantic error occurrences in the multimedia communications
by: Lee, , KW
Published: (2005)
by: Lee, , KW
Published: (2005)
CCS504 – COMPUTER VISION AND IMAGE PROCESSING
CSC543 – DIGITAL IMAGE PROCESSING - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
Low power ROM Employing Dynamic Threshold-Voltage MOSFET (DTMOS) Technique
by: M., Mustapa, et al.
Published: (2008)
by: M., Mustapa, et al.
Published: (2008)
Application of Contrast Enhancement Bilateral Closing Tophat Otsu Thresholding Technique on Crack Images
by: K. S., Sim, et al.
Published: (2008)
by: K. S., Sim, et al.
Published: (2008)
Equiconvergence in summation associated with elliptic polynomial
by: Fargana, A, et al.
Published: (2018)
by: Fargana, A, et al.
Published: (2018)
Hardware configuration
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A flexible bandwidth resource provisioning system with agent-enhanced SLA negotiation
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
Efficient Computation of Shortest Paths in Networks Using Particle Swarm Optimization and Noising Metaheuristics
by: Mohemmed, Ammar W., et al.
Published: (2007)
by: Mohemmed, Ammar W., et al.
Published: (2007)
Energy efficient routing for wireless sensor networks with grid topology
by: Goh, Hock Guan, et al.
Published: (2006)
by: Goh, Hock Guan, et al.
Published: (2006)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
CST236 – Digital Systems Design (Rekabentuk Sistem Digital)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Low threshold characteristics of an L-band Brillouin-erbium comb fiber laser in a linear cavity
by: Al-Mansoori, Mohammed Hayder, et al.
Published: (2006)
by: Al-Mansoori, Mohammed Hayder, et al.
Published: (2006)
SLA-driven flexible bandwidth reservation negotiation schemes for QoS aware IP networks
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
A Simulated Annealing-Based Hyper-Heuristic For The Flexible Job Shop Scheduling Problem
by: Kelvin, Lim Ching Wei
Published: (2023)
by: Kelvin, Lim Ching Wei
Published: (2023)
Design of adaptive supply voltage for sub-threshold logic based on sub-1V bandgap reference circuit
by: TEH, Y, et al.
Published: (2008)
by: TEH, Y, et al.
Published: (2008)
Similar Items
-
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003) -
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003) -
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003) -
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006) -
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)