Wallet Databases with Observers

Wallet Databases with Observers

1993 | David Chaum, Torben Pryds Pedersen
The paper introduces the concept of an electronic wallet, which combines a tamper-proof module (a tamper-proof device) and a user-controlled computer to securely manage personal databases. The wallet ensures both correctness (data integrity and control) and privacy (anonymity and confidentiality) for individuals and organizations. The tamper-proof module, controlled by organizations, ensures data integrity, while the user-controlled computer allows individuals to manage their data. The paper presents a new blind signature technique and protocols for obtaining certified public keys, enabling the tamper-proof module to authenticate messages from the user without revealing any information about the user's identity. These protocols are designed to be secure against both inflow and outflow, ensuring that the tamper-proof module cannot send any information to the organizations or receive any information from them. The paper also discusses the construction of databases that offer unconditional privacy and correctness, using probabilistic encryption to keep sensitive information hidden from both the user and the tamper-proof module. The protocols are demonstrated through detailed examples, showing how organizations can read and write data in the database while maintaining the user's privacy. The conclusion highlights the advantages of electronic wallets and outlines future work to further enhance security and privacy.The paper introduces the concept of an electronic wallet, which combines a tamper-proof module (a tamper-proof device) and a user-controlled computer to securely manage personal databases. The wallet ensures both correctness (data integrity and control) and privacy (anonymity and confidentiality) for individuals and organizations. The tamper-proof module, controlled by organizations, ensures data integrity, while the user-controlled computer allows individuals to manage their data. The paper presents a new blind signature technique and protocols for obtaining certified public keys, enabling the tamper-proof module to authenticate messages from the user without revealing any information about the user's identity. These protocols are designed to be secure against both inflow and outflow, ensuring that the tamper-proof module cannot send any information to the organizations or receive any information from them. The paper also discusses the construction of databases that offer unconditional privacy and correctness, using probabilistic encryption to keep sensitive information hidden from both the user and the tamper-proof module. The protocols are demonstrated through detailed examples, showing how organizations can read and write data in the database while maintaining the user's privacy. The conclusion highlights the advantages of electronic wallets and outlines future work to further enhance security and privacy.
Reach us at info@study.space
Understanding Wallet Databases with Observers