By using Pedersen’s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features: protecting the confidentiality of sensitive payment inf...By using Pedersen’s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features: protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.展开更多
文摘By using Pedersen’s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features: protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.