Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Nyberg K (ed) Advances in cryptology: EUROCRYPT’98. Lecture notes in computer science, vol 1403. Springer, Berlin, pp 127–144
Brands S (1994) Untraceable off-line cash in wallet with observers. In: Stinson DR (ed) Advances in cryptology: CRYPTO’93. Lecture notes in computer science, vol 773. Springer, Berlin, pp 302–318
Brickell E, Gemmell P, Kravitz D (1995) Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In: 6th ACM-SIAM symposium on discrete algorithms (SODA). ACM, New York, pp 457–466
Brumley D, Boneh D (2003) Remote timing attacks are practical. In: Proceedings of the 12th USENIX security symposium, Washington, DC, 2003. http://www.usenix.org/publications/library/proceedings/sec03/
Chaum D (1993) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in cryptology: CRYPTO’82. Lecture notes in computer science. Plenum, New York, pp 199–203
Chaum D (1990) Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. Advances in cryptology: AUSCRYPT’90, Sydney, Australia, January 1990. Lecture notes in computer science, vol 453. Springer, Berlin, pp 246–264
Chaum D, Pedersen TP (1993) Wallet databases with observers. In: Brickell EF (ed) Advances in cryptology: CRYPTO’92. Lecture notes in computer science, vol 740. Springer, Berlin, pp 89–105
Okamoto T, Ohta K (1989) Divertible zero-knowledge interactive proofs and commutative random self-reducibility. In: Quisquater J-J, Vandewalle J (eds) Advances in cryptology: EUROCRYPT’89. Lecture notes in computer science, vol 434. Springer, Berlin, pp 134–149
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Bleumer, G. (2011). Blinding Techniques. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_182
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_182
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering