Conclusions
The techniques presented allow powerful, readily extensible, and flexible arrangements for exchange of information between organizations about individuals. They protect against abuses by individuals, while providing unconditional security against linking of pseudonyms.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Reference
Chaum, D., “Security without Identification: Transaction Systems to make Big Brother Obsolete” Communications of the ACM, 28,10, (October 1985), 1030–1044. © 1985 by the Association for Computing Machinery. Excerpted by permission.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1986 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chaum, D. (1986). Showing Credentials Without Identification. In: Pichler, F. (eds) Advances in Cryptology — EUROCRYPT’ 85. EUROCRYPT 1985. Lecture Notes in Computer Science, vol 219. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39805-8_28
Download citation
DOI: https://doi.org/10.1007/3-540-39805-8_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16468-5
Online ISBN: 978-3-540-39805-9
eBook Packages: Springer Book Archive