Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David Chaum is active.

Publication


Featured researches published by David Chaum.


Communications of The ACM | 1981

Untraceable electronic mail, return addresses, and digital pseudonyms

David Chaum

A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceable return address. The technique can also be used to form rosters of untraceable digital pseudonyms from selected applications. Applicants retain the exclusive ability to form digital signatures corresponding to their pseudonyms. Elections in which any interested party can verify that the ballots have been properly counted are possible if anonymously mailed ballots are signed with pseudonyms from a roster of registered voters. Another use allows an individual to correspond with a record-keeping organization under a unique pseudonym, which appears in a roster of acceptable clients.


international cryptology conference | 1983

Blind Signatures for Untraceable Payments

David Chaum

Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the new electronic payments system may have a substantial impact on personal privacy as well as on the nature and extent of criminal use of payments. Ideally a new payments system should address both of these seemingly conflicting sets of concerns.


Communications of The ACM | 1985

Security without identification: transaction systems to make big brother obsolete

David Chaum

The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.


Journal of Cryptology | 1988

The dining cryptographers problem: unconditional sender and recipient untraceability

David Chaum

Keeping confidential who sends which messages, in a world where any physical transmission can be traced to its origin, seems impossible. The solution presented here is unconditionally or cryptographically secure, depending on whether it is based on one-time-use keys or on public keys, respectively. It can be adapted to address efficiently a wide variety of practical considerations.


international cryptology conference | 1988

Untraceable electronic cash

David Chaum; Amos Fiat; Moni Naor

An electronic cash protocol including the steps of using a one-way function f1 (x) to generate an image f1 (x1) from a preimage x1 ; sending the image f1 (x1) in an unblinded form to a second party; and receiving from the second party a note including a digital signature, wherein the note represents a commitment by the second party to credit a predetermined amount of money to a first presenter of the preimage x1 to the second party.


symposium on the theory of computing | 1988

Multiparty unconditionally secure protocols

David Chaum; Claude Crépeau; Ivan Damgård

Under the assumption that each pair of participants can communicate secretly, we show that any reasonable multiparty protocol can be achieved if at least 2n/3 of the participants are honest. The secrecy achieved is unconditional. It does not rely on any assumption about computational intractability.


international cryptology conference | 1992

Wallet Databases with Observers

David Chaum; Torben Pryds Pedersen

Previously there have been essentially only two models for computers that people can use to handle ordinary consumer transactions: (1) the tamper-proof module, such as a smart card, that the person cannot modify or probe: and (2) the personal workstation whose inner working is totally under control of the individual. The first part of this article argues that a particular combination of these two kinds of mechanism can overcome the limitations of each alone, providing both security and correctness for organizations as well as privacy and even anonymity for individuals.Then it is shown how this combined device, called a wallet, ran carry a database containing personal information. The construction presented ensures that no single part of the device (i.e. neither the tamper-proof part nor the workstation) can learn the contents of the database -- this information can only be recovered by the two parts together.


ieee symposium on security and privacy | 2004

Secret-ballot receipts: True voter-verifiable elections

David Chaum

A new kind of receipt sets a far higher standard of security by letting voters verify the election outcome - even if all election computers and records were compromised. The system preserves ballot secrecy, while improving access, robustness, and adjucation, all at lower cost.


european symposium on research in computer security | 2005

A practical voter-verifiable election scheme

David Chaum; Peter Y. A. Ryan; Steve Schneider

We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the voting system. The scheme also seeks to make the voter interface as familiar as possible.


theory and application of cryptographic techniques | 1994

Designated confirmer signatures

David Chaum

This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them.

Collaboration


Dive into the David Chaum's collaboration.

Top Co-Authors

Avatar

Poorvi L. Vora

George Washington University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ronald L. Rivest

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aleksander Essex

University of Western Ontario

View shared research outputs
Top Co-Authors

Avatar

Stefan Popoveniuc

George Washington University

View shared research outputs
Researchain Logo
Decentralizing Knowledge