2016
DOI: 10.1002/sec.1517
|View full text |Cite
|
Sign up to set email alerts
|

A highly efficient and secure electronic cash system based on secure sharing in cloud environment

Abstract: Online electronic transactions have become more and more popular in recent years. Electronic cash (e‐cash) has acted an important role, but e‐cash is digital data that can be copied easily, resulting in double spending. To ensure the security and fairness of transactions, researchers designed secure e‐cash payment systems. In 1982, Chaum proposed the first payment scheme using an RSA‐based, blind signature to achieve anonymity. Since then, many studies have been conducted, but most related schemes still have h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Secret sharing schemes are cryptographic primitives to protect a secret by sharing it to some values and assign them to different users. These schemes are used in many different applications such as cloud computing [1], key management in sensor networks [2], electronic voting [3] and electronic cash [4]. Secret sharing provides solutions for data privacy, availability, integrity and verifiability, which makes it suitable for these applications.…”
Section: Introductionmentioning
confidence: 99%
“…Secret sharing schemes are cryptographic primitives to protect a secret by sharing it to some values and assign them to different users. These schemes are used in many different applications such as cloud computing [1], key management in sensor networks [2], electronic voting [3] and electronic cash [4]. Secret sharing provides solutions for data privacy, availability, integrity and verifiability, which makes it suitable for these applications.…”
Section: Introductionmentioning
confidence: 99%
“…Secret sharing is a cryptographic primitive with many applications such as key management in sensor networks [1], electronic cash [2], electronic voting [3], and cloud computing [4]. A secret sharing scheme splits a secret among a set of parties, called participants, in such a way that some authorized subsets of the participants can reconstruct the secret using their assigned values, called shares, by a trusted third party named dealer.…”
Section: Introductionmentioning
confidence: 99%