Cryptography – Particular algorithmic function encoding – Public key
Patent
1995-08-04
1996-09-03
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Public key
380 25, H04L 930
Patent
active
055531458
ABSTRACT:
A number of electronic communications methods are described involving a first and a second party, with assistance from at least a trusted party, enabling electronic transactions in which the first party has a message for the second party. The first party, the second party and the trusted party undertake an exchange of transmissions, at least one of which occurs electronically and in an encrypted manner, such that if all transmissions reach their destinations the second party only receives the message if the first party receives at least one receipt. Preferably, the identity of the first party is temporarily withheld from the second party during the transaction. At least one receipt received to the first party enables the first party to prove the content of the message received by the second party.
REFERENCES:
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4458109 (1984-07-01), Mueller-Schloer
patent: 5214700 (1993-05-01), Pinkus et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1995-05-01), Micali
Chaum, David L., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms" communications of the ACM, Feb. 1981, vol. 24, No. 2, pp. 84-88.
Needham, et al, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, vol. 21, No. 12, Dec. 1978, pp. 993-999.
Chor, et al, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," POC, 26th FOCS, 1985, pp. 383-395.
Goldwasser, et al, "The Knowledge Complexity of Interactive Proof Systems," Siam Journal of Computing, vol. 18, No. 1, Feb. 1989, pp. 186-208.
Kolata, "Cryptographers Gather to Discuss Research-Analyses of how to break codes and new ways to us codes were featured at the meeting," Science, vol. 214, Nov. 6, 1981, pp. 646-647.
Blum, "How to Exchange (Secret) Keys," ACM Transactions on Computer Systems, vol. 1, No. 2, May 1983, pp. 175-193.
Rabin, "Transaction Protection by Beacons" Harvard University Center for Research in Computer Technology, Nov. 1981.
Even, et al, "A Randomized Protocol for Signing Contracts," Communications of the ACM, Jun. 1985, vol. 28, No. 6, pp. 637-647.
Ben-Or, et al, "A Fair Protocol for Signing Contracts," IEEE Transactions on Information Theory, vol. 36, No. 1, Jan. 1990.
Luby, et al, "How to Simultaneously Exchange a Secret Bit by Flipping A Symmetrically-Baised Coin," 1983.
Goldreich, et al, "Proofs that Yield Nothing But Their Validity or All Languages In NP Have Zero-Knowledge Proof Systems," Journal of the Association for Computing Machinery, vol. 38, No. 1, Jul. 1991, pp. 691-729.
Goldreich, et al, "How to Play Any Mental Game or A Completeness Theorem for Protocols with Honest Majority," Proceedings of the 27th Annual IEEE ACM Symposium on Theory of computing, May 1987, pp. 218-229.
Desmedt, et al, "Threshold cryptosystems," EE & CS Department, University of Wisconsin-Milwaukee.
Shamir, "How to Share a Secret," Communications of the ACM, Nov. 1979, vol. 22, No. 11, pp. 612-613.
Dolev et al., "Non-Malleable Cryptography" (Extended Abstract), Communications of the ACM, Mar., 1991, pp. 542-552.
Cangialosi Salvatore
Judson David H.
LandOfFree
Simultaneous electronic transactions with visible trusted partie does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Simultaneous electronic transactions with visible trusted partie, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Simultaneous electronic transactions with visible trusted partie will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1957701