I began my journey looking for a great solution hosted on Nuget but i couldn’t find a library that satisfied my needs. So what else can you do as a developer than writing your own.
Besides the common use of signatures, it is also possible to hide and recover information in cryptographic signatures. One may argue that encryption, either symmetric or asymmetric, could be used to hide the information. But in some scenarios: Symmettic encryption would result in the problem of key distribution. Another misleading way would be to encrypt […]
This post deals with the verification of the correctness of the Theorem 5.2 for anonymity from the work of Rubin et al on Crowds: “Anonymity for Web Transactions“. I did this to complete my Bachelors degree. The main statement to verify is that “The initiator of the message has proven probable innocence against the collaborative […]