David Chaum spends much of his time researching Computer security, Internet privacy, Undeniable signature, ecash and Cryptography. His Computer security research is multidisciplinary, relying on both Digital signature and Identification. His Digital signature research includes elements of Anonymous web browsing and Electronic voting.
In his study, Theoretical physics, Verifiable computing and Gas meter prover is inextricably linked to Zero-knowledge proof, which falls within the broad field of Undeniable signature. When carried out as part of a general Cryptography research project, his work on Cryptographic protocol is frequently linked to work in Distance-bounding protocol and Sign, therefore connecting diverse disciplines of study. His work in Mix network addresses issues such as Onion routing, which are connected to fields such as Public-key cryptography and Dining cryptographers problem.
His primary scientific interests are in Computer security, Theoretical computer science, Cryptography, Internet privacy and Voting. His Computer security research incorporates themes from Ballot, Verifiable secret sharing and Electronic voting. His work carried out in the field of Theoretical computer science brings together such families of science as Signature, Undeniable signature, Correctness, Zero-knowledge proof and Commitment scheme.
His work focuses on many connections between Cryptography and other disciplines, such as Public-key cryptography, that overlap with his field of interest in Pseudonym, Dining cryptographers problem and Pseudonymity. His Internet privacy research includes themes of Brother and Credential. David Chaum interconnects Cash, Payment system, Payment and Smart card in the investigation of issues within Blind signature.
His main research concerns Computer security, Voting, Electronic voting, Ballot and Cryptography. David Chaum combines subjects such as Help America Vote Act, Internet privacy and Cardinal voting systems with his study of Computer security. The concepts of his Voting study are interwoven with issues in Bulletin board, Verifiable secret sharing, Coercion and Human–computer interaction.
His study explores the link between Electronic voting and topics such as Research center that cross with problems in Library science and Executive summary. His Ballot study combines topics from a wide range of disciplines, such as Algorithm, Secrecy and Trusted Platform Module. The Cryptography study combines topics in areas such as Theoretical computer science and Usability.
His primary areas of study are Computer security, Ballot, Voting, Optoelectronics and Retina. Computer security and Computer communication networks are two areas of study in which David Chaum engages in interdisciplinary research. His Ballot research integrates issues from Secrecy, Verifiable secret sharing and Internet privacy.
His research integrates issues of End-to-end principle, Legislature, Politics and Electronic voting in his study of Verifiable secret sharing. His Internet privacy research is multidisciplinary, incorporating elements of Software deployment and The Internet. David Chaum has included themes like Pupil and Optics in his Optoelectronics study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Untraceable electronic mail, return addresses, and digital pseudonyms
David L. Chaum.
Communications of The ACM (1981)
Blind Signatures for Untraceable Payments
Devid L. Chaum.
international cryptology conference (1983)
Security without identification: transaction systems to make big brother obsolete
David Chaum.
Communications of The ACM (1985)
Group signatures
David Chaum;Eugène Van Heyst.
theory and application of cryptographic techniques (1991)
Multiparty unconditionally secure protocols
David Chaum;Claude Crépeau;Ivan Damgard.
symposium on the theory of computing (1988)
The dining cryptographers problem: unconditional sender and recipient untraceability
D. Chaum.
Journal of Cryptology (1988)
Untraceable Electronic Cash
David Chaum;Amos Fiat;Moni Naor.
international cryptology conference (1990)
Wallet Databases with Observers
David Chaum;Torben P. Pedersen.
international cryptology conference (1992)
Minimum disclosure proofs of knowledge
Gilles Brassard;David Chaum;C. Crépeau.
Journal of Computer Science and Technology (1988)
Distance-bounding protocols
Stefan Brands;David Chaum.
theory and application of cryptographic techniques (1994)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
MIT
University of Luxembourg
Aarhus University
McGill University
KU Leuven
KU Leuven
University of Montreal
University of Surrey
Microsoft (United States)
Johns Hopkins University
University of Oregon
Princeton University
Australian National University
Ricoh (Japan)
Harvard University
Korea Advanced Institute of Science and Technology
Museu Paraense Emílio Goeldi
Université Catholique de Louvain
Spanish National Research Council
NeuroGenetic Pharmaceuticals (United States)
Stanford University
National Institutes of Health
Centers for Disease Control and Prevention
The University of Texas MD Anderson Cancer Center
University of Geneva
University of Amsterdam