Javascript must be enabled to continue!
BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger
View through CrossRef
With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI) as a distributed public ledger is also briefly described.
Title: BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger
Description:
With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance.
Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others.
In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions.
Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication.
To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates.
“BIX” is an abbreviation for “Blockchain Information Exchange.
” Their purpose is equivalent to X.
509 certificates: to support security services for users and transactions, but also enhanced with anonymity.
This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use.
The BIX Certification Infrastructure (BCI) as a distributed public ledger is also briefly described.
.
Related Results
Regulation of Blockchain Token Sales in the United States
Regulation of Blockchain Token Sales in the United States
Abstract
This chapter provides an overview of how US securities regulation applies to the sale of cryptographic tokens using a distributed ledger, so-called initial ...
Boosting Multimodal Large Language Models with Visual Tokens Withdrawal for Rapid Inference
Boosting Multimodal Large Language Models with Visual Tokens Withdrawal for Rapid Inference
Multimodal large language models (MLLMs) demand considerable computations for inference due to the extensive parameters and the additional input tokens needed for visual informatio...
Dual Token Blockchains
Dual Token Blockchains
It is standard for blockchain platforms to issue native tokens, currencies, that users must own to operate within the platform. Some blockchains however decided to issue two tokens...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Enhancing Non-Formal Learning Certificate Classification with Text Augmentation: A Comparison of Character, Token, and Semantic Approaches
Enhancing Non-Formal Learning Certificate Classification with Text Augmentation: A Comparison of Character, Token, and Semantic Approaches
Aim/Purpose: The purpose of this paper is to address the gap in the recognition of prior learning (RPL) by automating the classification of non-formal learning certificates using d...
Poetess as Paratext: The Contextualizing Influence of Lydia H. Sigourney and Alice Cary in the New York Ledger
Poetess as Paratext: The Contextualizing Influence of Lydia H. Sigourney and Alice Cary in the New York Ledger
This chapter sets the stage for a poetics of paratextuality via a study of Lydia Huntly Sigourney and Alice Cary in Robert E. Bonner’s (1824-1899) New York Ledger. It argues that B...
Parameterized complexity of reconfiguration of atoms
Parameterized complexity of reconfiguration of atoms
Abstract
Our work is motivated by the challenges presented in preparing arrays of atoms for use in quantum simulation. The recently-developed process of loading atoms into ...
Using Progressive Ratio Schedules to Evaluate Edible, Leisure, and Token Reinforcement
Using Progressive Ratio Schedules to Evaluate Edible, Leisure, and Token Reinforcement
The general purpose of the current study was to evaluate the potency of different categories of reinforcers with young children diagnosed with developmental delays. The participant...

