Simultaneous electronic transactions with visible trusted partie

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, H04L 930

Patent

active

055531458

ABSTRACT:
A number of electronic communications methods are described involving a first and a second party, with assistance from at least a trusted party, enabling electronic transactions in which the first party has a message for the second party. The first party, the second party and the trusted party undertake an exchange of transmissions, at least one of which occurs electronically and in an encrypted manner, such that if all transmissions reach their destinations the second party only receives the message if the first party receives at least one receipt. Preferably, the identity of the first party is temporarily withheld from the second party during the transaction. At least one receipt received to the first party enables the first party to prove the content of the message received by the second party.

REFERENCES:
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4458109 (1984-07-01), Mueller-Schloer
patent: 5214700 (1993-05-01), Pinkus et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1995-05-01), Micali
Chaum, David L., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms" communications of the ACM, Feb. 1981, vol. 24, No. 2, pp. 84-88.
Needham, et al, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, vol. 21, No. 12, Dec. 1978, pp. 993-999.
Chor, et al, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," POC, 26th FOCS, 1985, pp. 383-395.
Goldwasser, et al, "The Knowledge Complexity of Interactive Proof Systems," Siam Journal of Computing, vol. 18, No. 1, Feb. 1989, pp. 186-208.
Kolata, "Cryptographers Gather to Discuss Research-Analyses of how to break codes and new ways to us codes were featured at the meeting," Science, vol. 214, Nov. 6, 1981, pp. 646-647.
Blum, "How to Exchange (Secret) Keys," ACM Transactions on Computer Systems, vol. 1, No. 2, May 1983, pp. 175-193.
Rabin, "Transaction Protection by Beacons" Harvard University Center for Research in Computer Technology, Nov. 1981.
Even, et al, "A Randomized Protocol for Signing Contracts," Communications of the ACM, Jun. 1985, vol. 28, No. 6, pp. 637-647.
Ben-Or, et al, "A Fair Protocol for Signing Contracts," IEEE Transactions on Information Theory, vol. 36, No. 1, Jan. 1990.
Luby, et al, "How to Simultaneously Exchange a Secret Bit by Flipping A Symmetrically-Baised Coin," 1983.
Goldreich, et al, "Proofs that Yield Nothing But Their Validity or All Languages In NP Have Zero-Knowledge Proof Systems," Journal of the Association for Computing Machinery, vol. 38, No. 1, Jul. 1991, pp. 691-729.
Goldreich, et al, "How to Play Any Mental Game or A Completeness Theorem for Protocols with Honest Majority," Proceedings of the 27th Annual IEEE ACM Symposium on Theory of computing, May 1987, pp. 218-229.
Desmedt, et al, "Threshold cryptosystems," EE & CS Department, University of Wisconsin-Milwaukee.
Shamir, "How to Share a Secret," Communications of the ACM, Nov. 1979, vol. 22, No. 11, pp. 612-613.
Dolev et al., "Non-Malleable Cryptography" (Extended Abstract), Communications of the ACM, Mar., 1991, pp. 542-552.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Simultaneous electronic transactions with visible trusted partie does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Simultaneous electronic transactions with visible trusted partie, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Simultaneous electronic transactions with visible trusted partie will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1957701

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.