Skip to main content
  • 74 Accesses

Related Concepts

Anonymity

Definition

A blackmailing attack consists in coercing an authority (e.g., by taking a hostage) to publish (e.g., in a newspaper or on the Internet) an encrypted version of a system secret key. Blackmailing attacks are a concern in anonymous cash systems that have no anonymity revocation features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. von Solms S, Naccache D (1992) On blind signatures and perfect crimes. Computers and Security, 11:581–583

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Naccache, D. (2011). Blackmailing Attacks. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_889

Download citation

Publish with us

Policies and ethics