Wallet Databases with Observers

Wallet Databases with Observers

1993 | David Chaum, Torben Pryds Pedersen
This paper introduces the concept of electronic wallets as a secure and efficient solution for handling personal transactions. The wallet combines two components: a user-controlled computer (C) and a tamper-proof module (T) issued by organizations. This combination ensures both security and privacy for individuals while maintaining correctness for organizations. The wallet can store personal information in a database, and its design ensures that no single component can access the database contents, as the information can only be recovered by both parts together. The paper discusses the importance of correctness and privacy in transaction systems. Correctness ensures that only authorized entities can access or modify data, while privacy allows individuals to participate in transactions without revealing their identity. Three levels of privacy are defined: pure trust, computational privacy, and unconditional privacy. The paper presents protocols for achieving these goals, including a new blind signature technique. Blind signatures allow the tamper-proof module (T) to sign messages without revealing the content of the message to the user. This is crucial for ensuring that T can authenticate actions taken by C without learning the contents of the database. The paper also describes how the wallet can be used to store and manage personal databases. It shows how T can validate information sent from the wallet without knowing the contents of the database. This is achieved through a combination of cryptographic techniques and secure protocols that ensure the integrity and confidentiality of the data. The paper concludes that electronic wallets provide a secure and efficient way to handle personal transactions, ensuring both correctness and privacy. The protocols presented allow T to control and validate all messages from the user to the outside world, ensuring that the privacy of the person is not compromised. The paper also highlights the need for further research to address potential vulnerabilities and improve the security of the system.This paper introduces the concept of electronic wallets as a secure and efficient solution for handling personal transactions. The wallet combines two components: a user-controlled computer (C) and a tamper-proof module (T) issued by organizations. This combination ensures both security and privacy for individuals while maintaining correctness for organizations. The wallet can store personal information in a database, and its design ensures that no single component can access the database contents, as the information can only be recovered by both parts together. The paper discusses the importance of correctness and privacy in transaction systems. Correctness ensures that only authorized entities can access or modify data, while privacy allows individuals to participate in transactions without revealing their identity. Three levels of privacy are defined: pure trust, computational privacy, and unconditional privacy. The paper presents protocols for achieving these goals, including a new blind signature technique. Blind signatures allow the tamper-proof module (T) to sign messages without revealing the content of the message to the user. This is crucial for ensuring that T can authenticate actions taken by C without learning the contents of the database. The paper also describes how the wallet can be used to store and manage personal databases. It shows how T can validate information sent from the wallet without knowing the contents of the database. This is achieved through a combination of cryptographic techniques and secure protocols that ensure the integrity and confidentiality of the data. The paper concludes that electronic wallets provide a secure and efficient way to handle personal transactions, ensuring both correctness and privacy. The protocols presented allow T to control and validate all messages from the user to the outside world, ensuring that the privacy of the person is not compromised. The paper also highlights the need for further research to address potential vulnerabilities and improve the security of the system.
Reach us at info@futurestudyspace.com