David Chaum

Last updated
David Chaum
David Chaum at Web Summit 2022.jpg
Chaum in 2022
Born1955 (age 6869)
Alma mater University of California, Berkeley
Occupations
Known for
Scientific career
Fields Computer science
Thesis Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups  (1982)
Doctoral advisor Bernard Marcel Mont-Reynaud
Website www.chaum.com

David Lee Chaum (born 1955) is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertation "Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups" is the first known proposal for a blockchain protocol. [1] Complete with the code to implement the protocol, Chaum's dissertation proposed all but one element of the blockchain later detailed in the Bitcoin whitepaper. He has been referred to as "the father of online anonymity", [2] and "the godfather of cryptocurrency". [3]

Contents

He is also known for developing ecash, an electronic cash application that aims to preserve a user's anonymity, and inventing many cryptographic protocols like the blind signature, mix networks and the Dining cryptographers protocol. In 1995 his company DigiCash created the first digital currency with eCash. [4] :65–70 His 1981 paper, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", laid the groundwork for the field of anonymous communications research. [5]

More recently in 2020, Chaum founded xx network, a privacy-focused blockchain platform, and in 2021 launched xx coin (abbreviation XX), a cryptocurrency designed to enhance user privacy and provide quantum resistance. [6] [7]

Life and career

Chaum was born to a Jewish family in Los Angeles, California. [8] He gained a doctorate in computer science from the University of California, Berkeley, in 1982. [9] [10] Also that year, he founded the International Association for Cryptologic Research (IACR), which currently organizes academic conferences in cryptography research. [11] :47 Subsequently, he taught at the New York University Graduate School of Business Administration and at the University of California, Santa Barbara (UCSB). He also formed a cryptography research group at CWI, the Dutch National Research Institute for Mathematics and Computer Science in Amsterdam. [12] He founded DigiCash, an electronic cash company, in 1990. [4] :119

Chaum received the Information Technology European Award for 1995. [13] In 2004, he was named an IACR Fellow. [14] In 2010, at the RSA Conference, he was honored with the RSA Award for Excellence in Mathematics. [15] In 2019, he was awarded the honorary title of Dijkstra Fellow by CWI. [16] He received an honorary doctorate from the University of Lugano in 2021. [17]

Chaum resides in Sherman Oaks, Los Angeles. [18]

Notable research contributions

Vault systems

Recently credited by Alan Sherman's "On the Origins and Variations of Blockchain Technologies", [1] Chaum's 1982 Berkeley dissertation proposed every element of the blockchain found in Bitcoin except proof of work. The proposed vault system lays out a plan for achieving consensus state between nodes, chaining the history of consensus in blocks, and immutably time-stamping the chained data. The paper also lays out the specific code to implement such a protocol.

Digital cash

Chaum is credited as the inventor of secure digital cash for his 1983 paper, which also introduced the cryptographic primitive of a blind signature. [19] These ideas have been described as the technical roots of the vision of the Cypherpunk movement that began in the late 1980s. [20] Chaum's proposal allowed users to obtain digital currency from a bank and spend it in a manner that is untraceable by the bank or any other party. [21] In 1988, he extended this idea (with Amos Fiat and Moni Naor) to allow offline transactions that enable detection of double-spending. [22]

In 1990, he founded DigiCash, an electronic cash company, in Amsterdam to commercialize the ideas in his research. [4] :119 The first electronic payment was sent in 1994. [23] In 1998, DigiCash filed for bankruptcy, and in 1999 Chaum sold off DigiCash and ended his involvement with the company. [12] [24]

New types of digital signatures

In the same 1982 paper that proposed digital cash, Chaum introduced blind signatures. [19] This form of digital signature blinds the content of a message before it is signed, so that the signer cannot determine the content. The resulting blind signature can be publicly verified against the original, unblinded message in the manner of a regular digital signature. [25]

In 1989, he (with Hans van Antwerpen) introduced undeniable signatures. [26] This form of digital signature uses a verification process that is interactive, so that the signatory can limit who can verify the signature. Since signers may refuse to participate in the verification process, signatures are considered valid unless a signer specifically uses a disavowal protocol to prove that a given signature was not authentic. [27]

In 1991, he (with Eugene van Heyst) introduced group signatures, which allow a member of a group to anonymously sign a message on behalf of the entire group. [28] However an appointed group manager holds the power to revoke the anonymity of any signer in the case of disputes. [29]

Anonymous communication

In 1981, Chaum proposed the idea of an anonymous communication network in a paper. [30] His proposal, called mix networks, allows a group of senders to submit an encryption of a message and its recipient to a server. Once the server has a batch of messages, it will reorder and obfuscate the messages so that only this server knows which message came from which sender. The batch is then forwarded to another server who does the same process. Eventually, the messages reach the final server where they are fully decrypted and delivered to the recipient. A mechanism to allow return messages is also proposed. Mix networks are the basis of some remailers and are the conceptual ancestor to modern anonymous web browsing tools like Tor (based on onion routing). Chaum has advocated that every router be made, effectively, a Tor node. [31]

In 1988, Chaum introduced a different type of anonymous communication system called a DC-Net, which is a solution to his proposed Dining Cryptographers Problem. [32] DC-Nets is the basis of the software tool Dissent. [33]

In 2017, Chaum published a description of a new variety of mix network. [34] A real-world implementation of this network, called cMix and running on the xx network, later became the data transmission layer for the instant messaging platform xx messenger. [35]

Trustworthy voting systems

Chaum has made numerous contributions to secure voting systems, including the first proposal of a system that is end-to-end verifiable. This proposal, made in 1981, [30] was given as an application of mix networks. In this system, the individual ballots of voters were kept private which anyone could verify that the tally was counted correctly. This, and other early cryptographic voting systems, assumed that voters could reliably compute values with their personal computers. In 1991,[ citation needed ] Chaum introduced SureVote which allowed voters to cast a ballot from an untrustworthy voting system, [36] proposing a process now called "code voting" and used in remote voting systems like Remotegrity and DEMOS. [37] [38]

In 1994, Chaum introduced the first in-person voting system in which voters cast ballots electronically at a polling station and cryptographically verify that the DRE did not modify their vote (or even learn what it was). [39] In the following years, Chaum proposed (often with others) a series a cryptographically verifiable voting systems that use conventional paper ballots: Prêt à Voter, [40] Punchscan, [41] and Scantegrity. [42] The city of Takoma Park, Maryland used Scantegrity for its November, 2009 election. [43] This was the first time a public sector election was run using any cryptographically verifiable voting system. [44]

In 2011, Chaum proposed Random Sample Elections. [45] This electoral system allows a verifiably random selection of voters, who can maintain their anonymity, to cast votes on behalf the entire electorate. [46]

Other contributions

In a 1979 report published as Memorandum No. UCB/ERL M79/10 [47] by the Electronics Research Laboratory at the University of California, Berkeley, Chaum proposed a mechanism for splitting a cryptographic key into partial keys that could be distributed among mutually suspicious groups. This concept was a significant predecessor to what is now known as secret sharing. [48]

In 1985, Chaum proposed the original anonymous credential system, [21] which is sometimes also referred to as a pseudonym system. [49] This stems from the fact that the credentials of such a system are obtained from and shown to organizations using different pseudonyms which cannot be linked.

In 1988, Chaum with Gilles Brassard and Claude Crépeau published a paper [50] that introduced zero-knowledge arguments, as well as a security model using information-theoretic private-channels, and also first formalized the concept of a commitment scheme.

1991, with Torben Pedersen, he demonstrated a well-cited zero-knowledge proof of a DDH tuple. [51] This proof is particularly useful as it can prove proper reencryption of an ElGamal ciphertext.

Chaum contributed to an important commitment scheme which is often attributed to Pedersen. In fact, Pedersen, in his 1991 paper, [52] cites a rump session talk on an unpublished paper by Jurjen Bos and Chaum for the scheme. It appeared even earlier in a paper by Chaum, Damgard, and Jeroen van de Graaf. [53]

In 1993 with Stefan Brands, Chaum introduced the concept of a distance-bounding protocol. [54]

In 2019, he was one of the speakers at the fifth Ethereum developer conference, which was held in Japan. [55]

In July 2024, Chaum sat down with Vitalik Buterin, co-founder of Ethereum for a panel on the future of privacy at Plasmacon conference at the United Nations University in Tokyo, Japan. [56]

Bibliography

Related Research Articles

Articles related to cryptography include:

Ecash was conceived by David Chaum as an anonymous cryptographic electronic money or electronic cash system in 1982. It was realized through his corporation Digicash and used as micropayment system at one US bank from 1995 to 1998.

<span class="mw-page-title-main">Blind signature</span> Form of digital signature

In cryptography a blind signature, as introduced by David Chaum, is a form of digital signature in which the content of a message is disguised (blinded) before it is signed. The resulting blind signature can be publicly verified against the original, unblinded message in the manner of a regular digital signature. Blind signatures are typically employed in privacy-related protocols where the signer and message author are different parties. Examples include cryptographic election systems and digital cash schemes.

Provable security refers to any type or level of computer security that can be proved. It is used in different ways by different fields.

Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology – Crypto '96. Kleptography is a subfield of cryptovirology and is a natural extension of the theory of subliminal channels that was pioneered by Gus Simmons while at Sandia National Laboratory. A kleptographic backdoor is synonymously referred to as an asymmetric backdoor. Kleptography encompasses secure and covert communications through cryptosystems and cryptographic protocols. This is reminiscent of, but not the same as steganography that studies covert communications through graphics, video, digital audio data, and so forth.

A group signature scheme is a method for allowing a member of a group to anonymously sign a message on behalf of the group. The concept was first introduced by David Chaum and Eugene van Heyst in 1991. For example, a group signature scheme could be used by an employee of a large company where it is sufficient for a verifier to know a message was signed by an employee, but not which particular employee signed it. Another application is for keycard access to restricted areas where it is inappropriate to track individual employee's movements, but necessary to secure areas to only employees in the group.

In cryptography, a ring signature is a type of digital signature that can be performed by any member of a set of users that each have keys. Therefore, a message signed with a ring signature is endorsed by someone in a particular set of people. One of the security properties of a ring signature is that it should be computationally infeasible to determine which of the set's members' keys was used to produce the signature. Ring signatures are similar to group signatures but differ in two key ways: first, there is no way to revoke the anonymity of an individual signature; and second, any set of users can be used as a signing set without additional setup.

Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a driver's license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket or a public transport ticket, a digital credential is a proof of qualification, competence, or clearance that is attached to a person. Also, digital credentials prove something about their owner. Both types of credentials may contain personal information such as the person's name, birthplace, birthdate, and/or biometric information such as a picture or a finger print.

DigiCash Inc. was an electronic money corporation founded by David Chaum in 1989. DigiCash transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder. DigiCash declared bankruptcy in 1998 and subsequently sold its assets to eCash Technologies, another digital currency company, which was acquired by InfoSpace on February 19, 2002.

<span class="mw-page-title-main">Moni Naor</span> Israeli computer scientist (born 1961)

Moni Naor is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science. Naor received his Ph.D. in 1989 at the University of California, Berkeley. His advisor was Manuel Blum.

<span class="mw-page-title-main">Adam Back</span> British cryptographer and cypherpunk (born 1970)

Adam Back is a British cryptographer and cypherpunk. He is the CEO of Blockstream, which he co-founded in 2014. He invented Hashcash, which is used in the bitcoin mining process.

Non-interactive zero-knowledge proofs are cryptographic primitives, where information between a prover and a verifier can be authenticated by the prover, without revealing any of the specific information beyond the validity of the statement itself. This makes direct communication between the prover and verifier unnecessary, effectively removing any intermediaries.

In cryptography, subliminal channels are covert channels that can be used to communicate secretly in normal looking communication over an insecure channel. Subliminal channels in digital signature crypto systems were found in 1984 by Gustavus Simmons.

Amos Fiat is an Israeli computer scientist, a professor of computer science at Tel Aviv University. He is known for his work in cryptography, online algorithms, and algorithmic game theory.

In cryptography, server-based signatures are digital signatures in which a publicly available server participates in the signature creation process. This is in contrast to conventional digital signatures that are based on public-key cryptography and public-key infrastructure. With that, they assume that signers use their personal trusted computing bases for generating signatures without any communication with servers.

In cryptography, an accumulator is a one way membership hash function. It allows users to certify that potential candidates are a member of a certain set without revealing the individual members of the set. This concept was formally introduced by Josh Benaloh and Michael de Mare in 1993.

A cryptocurrency wallet is a device, physical medium, program or an online service which stores the public and/or private keys for cryptocurrency transactions. In addition to this basic function of storing the keys, a cryptocurrency wallet more often offers the functionality of encrypting and/or signing information. Signing can for example result in executing a smart contract, a cryptocurrency transaction, identification, or legally signing a 'document'.

Direct Recording Electronic with Integrity and Enforced Privacy (DRE-ip) is an End-to-End (E2E) verifiable e-voting system without involving any tallying authorities, proposed by Siamak Shahandashti and Feng Hao in 2016. It improves a previous DRE-i system by using a real-time computation strategy and providing enhanced privacy. A touch-screen based prototype of the system was trialed in the Gateshead Civic Centre polling station on 2 May 2019 during the 2019 United Kingdom local elections with positive voter feedback. A proposal that includes DRE-ip as a solution for large-scale elections was ranked 3rd place in the 2016 Economist Cybersecurity Challenge jointly organized by The Economist and Kaspersky Lab.

Aggelos Kiayias is a Greek cryptographer and computer scientist, currently a professor at the University of Edinburgh and the Chief Science Officer at Input Output Global, the company behind Cardano.

An oblivious pseudorandom function (OPRF) is a cryptographic function, similar to a keyed-hash function, but with the distinction that in an OPRF two parties cooperate to securely compute a pseudorandom function (PRF).

References

  1. 1 2 Alan T. Sherman, Farid Javani, Haibin Zhang, Enis Golaszewski (January–February 2019). "On the Origins and Variations of Blockchain Technologies". IEEE Security & Privacy. 17 (1): 72–77. arXiv: 1810.06130 . doi:10.1109/MSEC.2019.2893730. S2CID   53114747.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  2. Greenberg, Andy (January 6, 2016). "The Father of Online Anonymity Has a Plan to End the Crypto War". Wired Magazine. Archived from the original on May 7, 2023. Retrieved February 8, 2022.
  3. "Meet The Godfather Of Crypto, Who's Been Working On Digital Currency Since The Early 80s". Bloomberg News. May 27, 2019. Archived from the original on 2022-03-05. Retrieved 2022-03-05.
  4. 1 2 3 Greenberg, Andy (2012). This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information. Dutton Adult. ISBN   0525953205.
  5. Danezis, George; Diaz, Claudia (January 2008) "Survey of Anonymous Communication Channels Archived 2023-05-19 at the Wayback Machine " PDF Archived 2023-05-19 at the Wayback Machine . Technical Report MSR-TR-2008-35. Microsoft Research; For the paper, see Chaum, David (1981). "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms" (PDF). Communications of the ACM. 24 (2): 84–90. doi:10.1145/358549.358563. S2CID   30340230. Archived (PDF) from the original on 2020-09-19. Retrieved 2019-09-24.
  6. https://xxfoundation.org/directory/ | https://xx.network/blog/xxcoin-tokenomics/
  7. https://www.crowdfundinsider.com/2019/11/154425-digital-currency-pioneer-david-chaum-announces-upcoming-release-of-xx-network-a-blockchain-for-conducting-secure-transctions/
  8. Levy, Steven (2012). Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age. Penguin Books. ISBN   9781101199466.
  9. 1 2 David Lee Chaum. "Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups." University of California, Berkeley, 1982. Archived 2023-05-10 at the Wayback Machine
  10. Pitta, Julie (November 1, 1999). "Requiem for a Bright Idea". Forbes.
  11. Blanchette, Jean-François (2012). Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents. MIT Press. ISBN   026230080X.
  12. 1 2 "On the Identity Trail - David Chaum: Bio". Archived from the original on 2013-12-02. Retrieved 2013-06-13.
  13. Rotenberg, Marc (May 1, 1996). "Eurocrats Do Good Privacy". Wired Magazine. Archived from the original on March 28, 2014. Retrieved June 17, 2013.
  14. "IACR Fellows". IACR. Archived from the original on April 24, 2018. Retrieved June 17, 2013.
  15. "RSA Conference | RSA Conference USA 2010 | Congratulations to this year's RSA Conference 2010 Award winners!". Archived from the original on 2013-06-16. Retrieved 2013-06-13.
  16. "David Chaum and Guido van Rossum awarded Dijkstra Fellowship". CWI. Archived from the original on 2022-12-07. Retrieved 2019-11-22.
  17. "USI Honorary Doctorates". USI. Archived from the original on June 3, 2021. Retrieved May 16, 2021.
  18. "E-cash inventor David Chaum on making a comeback, pre-empting bitcoin, and keeping Satoshi anonymous". finance.yahoo.com. 23 April 2019. Archived from the original on 2022-06-10. Retrieved 2019-11-02.
  19. 1 2 Chaum, David (1983). "Blind Signatures for Untraceable Payments" (PDF). Advances in Cryptology. Vol. 82. Boston, MA: Springer. pp. 199–203. doi:10.1007/978-1-4757-0602-4_18. ISBN   978-1-4757-0604-8. Archived (PDF) from the original on 2014-12-18. Retrieved 2013-06-13.
  20. Arvind Narayanan: What Happened to the Crypto Dream?, Part 1 Archived 2019-10-29 at the Wayback Machine . IEEE Security & Privacy. Volume 11, Issue 2, March–April 2013, pages 75-76, ISSN 1540-7993
  21. 1 2 Chaum, David (October 1985). "Security without identification: transaction systems to make big brother obsolete". Communications of the ACM. 28 (10): 1030–1044. CiteSeerX   10.1.1.319.3690 . doi:10.1145/4372.4373. S2CID   15340054. Archived from the original on 2024-04-19. Retrieved 2024-08-21.
  22. Chaum, D.; Fiat, A.; Naor, M. (1990), "Untraceable electronic cash", Proceedings on Advances in Cryptology – CRYPTO '88, Lecture Notes in Computer Science, vol. 403, London, UK: Springer-Verlag, pp. 319–327
  23. "EFF:". Archived from the original on 2015-01-07. Retrieved 2013-06-13.
  24. Pitta, Julie (1 November 1999). "Requiem for a Bright Idea". Forbes. Archived from the original on 30 August 2017. Retrieved 8 October 2022.
  25. "RSA Laboratories - 7.3 What is a blind signature scheme?". Archived from the original on 2012-08-26. Retrieved 2013-06-13.
  26. Chaum, David; van Antwerpen, Hans (1990). "Undeniable Signatures". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 212–216. doi:10.1007/0-387-34805-0_20. ISBN   978-0-387-97317-3.
  27. "RSA Laboratories - 7.8 What is an undeniable signature scheme?". Archived from the original on 2012-08-20. Retrieved 2013-06-13.
  28. Chaum, David; van Heyst, Eugene (1991). "Group Signatures" (PDF). Advances in Cryptology – EUROCRYPT '91. Lecture Notes in Computer Science. Vol. 547. pp. 257–265. doi: 10.1007/3-540-46416-6_22 . ISBN   978-3-540-54620-7. Archived (PDF) from the original on 2023-05-13. Retrieved 2023-05-13.
  29. "RSA Laboratories - 7.6 What is a group signature?". Archived from the original on 2012-08-20. Retrieved 2013-06-13.
  30. 1 2 Chaum, D. L. (1981). "Untraceable electronic mail, return addresses, and digital pseudonyms". Communications of the ACM. 24 (2): 84–90. doi:10.1145/358549.358563. S2CID   30340230. Archived (PDF) from the original on 2020-09-19. Retrieved 2019-09-24.
  31. Video on YouTube
  32. David Chaum (1988). "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability". Journal of Cryptology. 1 (1): 65–75. CiteSeerX   10.1.1.127.4293 . doi:10.1007/BF00206326. S2CID   2664614. Archived from the original on 2014-12-21. Retrieved 2013-06-13.
  33. "Dedis@yale | Dissent: Accountable Anonymous Group Communication". Archived from the original on 2013-08-28. Retrieved 2013-06-13.
  34. Chaum, D., Das, D., Javani, F., Kate, A., Krasnova, A., Ruiter, J.D., & Sherman, A.T. (2017). cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS.
  35. Greenberg, Andy. "The Father of Online Anonymity Has a Plan to End the Crypto War". Wired. ISSN   1059-1028. Archived from the original on 2023-05-07. Retrieved 2022-09-02.
  36. Chaum, David (2001). "SureVote: Technical Overview. Proceedings of the Workshop on Trustworthy Elections (WOTE '01)" (PDF). Archived (PDF) from the original on 2008-10-23. Retrieved 2021-04-23.
  37. Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora (2013), "Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System Archived 2013-06-24 at the Wayback Machine ," 11th International Conference on Applied Cryptography and Network Security (ACNS 2013).
  38. "E2E-VIV Project | U.S. Vote Foundation". www.usvotefoundation.org. Archived from the original on 2016-09-11. Retrieved 2021-04-28.
  39. Declan McCullagh, "High hopes for unscrambling the vote" Archived 2023-05-19 at the Wayback Machine , CNET News, October 1, 2004.
  40. Chaum, D.; P.Y.A. Ryan; S. Schneider (2005), "A Practical Voter-Verifiable Election Scheme" (PDF), Computer Security – ESORICS 2005, Lecture Notes in Computer Science, 3679: 118–139, CiteSeerX   10.1.1.456.7748 , doi:10.1007/11555827_8, ISBN   978-3-540-28963-0, archived from the original (PDF) on 2012-03-14
  41. S. Cherry, "Making Every E-Vote Count", IEEE Spectrum, Jan 1 2007.
  42. M. Lafsky, "Protecting Your Vote With Invisible Ink," Archived 2013-11-01 at the Wayback Machine Discover Magazine, Oct 2008.
  43. Pilot Study of the Scantegrity II Voting System Planned for the 2009 Takoma Park City Election (PDF), archived from the original (PDF) on July 19, 2011
  44. Hardesty, Larry (2009-11-13), "Cryptographic voting debuts", MIT news, archived from the original on 2023-05-19, retrieved 2023-05-19
  45. "Random Sample Elections". Archived from the original on 2013-06-23. Retrieved 2013-06-28.
  46. Joshua Davis. "How Selecting Voters Randomly Can Lead to Better Elections Archived 2023-01-06 at the Wayback Machine ." Wired, 16.05.2012.
  47. Chaum, David L. (February 22, 1979). Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups (PDF) (Report). Memorandum. University of California, Berkeley, Electronics Research Laboratory. Archived from the original (PDF) on 2022-06-15. Retrieved 2024-08-21.
  48. Chaum, D. (1985). How to Keep a Secret Alive (PDF). Lecture Notes in Computer Science. Vol. 196. Berlin, Heidelberg: Springer. pp. 481–485. doi:10.1007/3-540-39568-7_40. ISBN   978-3-540-15658-1. Archived (PDF) from the original on 2023-03-16. Retrieved 2024-08-21.
  49. Lysyanskaya, Anna; Rivest, Ronald L.; Sahai, Amit; Wolf, Stefan (2000). "Pseudonym systems". In Heys, Howard M.; Adams, Carlisle M. (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 1758. Springer. pp. 184–199. doi:10.1007/3-540-46513-8_14. ISBN   978-3-540-67185-5. S2CID   77189.
  50. Gilles Brassard, David Chaum, and Claude Crepeau, Minimum Disclosure Proofs of Knowledge Archived 2011-09-27 at the Wayback Machine , Journal of Computer and System Sciences, vol. 37, pp. 156–189, 1988.
  51. David Chaum and Torben P. Pedersen. 1992. Wallet Databases with Observers. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92), Ernest F. Brickell (Ed.). Springer-Verlag, London, UK, UK, 89-105.
  52. Pedersen, T. P. (1992). "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing". Advances in Cryptology – CRYPTO '91. Lecture Notes in Computer Science. Vol. 576. Berlin, Heidelberg: Springer. pp. 129–140. doi:10.1007/3-540-46766-1_9. ISBN   978-3-540-55188-1.
  53. Chaum, D.; Damgård, I. B.; Graaf, J. (1988). "Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result". Advances in Cryptology – CRYPTO '87. Lecture Notes in Computer Science. Vol. 293. p. 87. doi:10.1007/3-540-48184-2_7. ISBN   978-3-540-18796-7.
  54. Stefan Brands, David Chaum: Distance-bounding protocols (extended abstract). Proceedings Eurocrypt '93.
  55. David Chaum (Devcon5) on YouTube
  56. David Chaum & Vitalik Buterin - Plasmacon - Future of Privacy on YouTube
  57. Advances in Cryptology – Proceedings of CRYPTO 82. Chaum, David., Rivest, Ronald L., Sherman, Alan T. New York: Plenum Press. 1983. ISBN   0306413663. OCLC   9488557.{{cite book}}: CS1 maint: others (link)
  58. Advances in Cryptology – Proceedings of Crypto 83. Chaum, David. New York: Plenum Press. 1984. ISBN   9781468447309. OCLC   681096555.{{cite book}}: CS1 maint: others (link)
  59. Chaum, David; Fiat, Amos; Naor, Moni (1990). "Untraceable Electronic Cash". In Goldwasser, Shafi (ed.). Advances in Cryptology — CRYPTO' 88. Lecture Notes in Computer Science. Vol. 403. Springer New York. pp. 319–327. doi: 10.1007/0-387-34799-2_25 . ISBN   9780387971964.
  60. "Swiss National Bank (SNB) - How to issue a central bank digital currency". www.snb.ch. Archived from the original on 2021-03-27. Retrieved 2021-03-29.

Further reading