Accession Number:

ADA314487

Title:

Anonymous Atomic Transactions,

Descriptive Note:

Corporate Author:

CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE

Report Date:

1996-07-01

Pagination or Media Count:

18.0

Abstract:

We show here an example of a protocol that satisfies anonymity properties while providing strong ACID atomic, consistent, isolated, durable transactional properties, resolving an open question. Blinded signatures are used to certify an anonymous asymmetric key which authorizes the use of a specified value. A public transaction log is used to support a linear commitment scheme for transactions in which the value authorized by the blind signed key is spent. We show here an example of a protocol that satisfies anonymity properties while providing strong ACID atomic, consistent, isolated, durable transactional properties, resolving an open question. Blinded signatures are used to certify an anonymous asymmetric key which authorizes the use of a specified value. A public transaction log is used to support a linear commitment scheme for transactions in which the value authorized by the blind signed key is spent.

Subject Categories:

  • Computer Systems
  • Computer Systems Management and Standards

Distribution Statement:

APPROVED FOR PUBLIC RELEASE