N. Asokan, V. Shoup and M. Waidner. Optimistic fair exchange of digital signatures. Lecture Notes in Computer Science 1403, Advances in Cryptology: Proceedings of Eurocrypt’98, pages 591–606, Helsinki, Finland, June 1998.
Google Scholar
G. Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. Proceedings of 6th ACM Conference on Computer and Communications Security, pages 138–146, Singapore, November 1999.
Google Scholar
F. Bao, R. H. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 77–85, Oakland, California, May 1998.
Google Scholar
M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. Van Herreweghen and M. Waidner. Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications, 18(4):611–627, April 2000.
CrossRef
Google Scholar
J. Camenisch, U. Maurer and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. Lecture Notes in Computer Science 1146, Computer Security: Proceedings of 1996 European Symposium on Research in Computer Security, pages 33–43, Rome, September 1996.
Google Scholar
G. Davida, Y. Frankel, Y. Tsiounis and M. Yung. Anonymity control in e-cash systems. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 1–16, Anguilla BWI, February 1997.
Google Scholar
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469–472, July 1985.
CrossRef
MathSciNet
Google Scholar
D. M. Goldschlag and S. G. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. Lecture Notes in Computer Science 1465, Proceedings of 1998 Financial Cryptography, Anguilla BWI, February 1998.
Google Scholar
L. C. Guillou and J. J. Quisquater. A paradoxical identity-based signature scheme resulting from zero-knowledge. Lecture Notes in Computer Science 403, Advances in Cryptology: Proceedings of Crypto’88, pages 216–231, Santa Barbara, California, August 1988.
Google Scholar
R. Rivest. Electronic lottery tickets as micropayments. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 307–314, Anguilla BWI, February 1997.
Google Scholar
K. Sako. Implementation of a digital lottery server on WWW. Lecture Notes in Computer Science 1740, Proceedings of CQRE’99, pages 101–108, Dusseldorf, Germany, December 1999.
Google Scholar
P. Syverson. Weakly secret bit commitment: Applications to lotteries and fair exchange. Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998.
Google Scholar
E. Van Herreweghen. Secure anonymous signature-based transactions. Lecture Notes in Computer Science 1895, Computer Security: Proceedings of 2000 European Symposium on Research in Computer Security, pages 55–71, Toulouse, France, October 2000.
Google Scholar