Sciweavers

116 search results - page 2 / 24
» A Security Model for Anonymous Credential Systems
Sort
View
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 5 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
13 years 12 months ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
SPW
2004
Springer
13 years 10 months ago
Limits to Anonymity When Using Credentials
This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure....
Andreas Pashalidis, Chris J. Mitchell
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 11 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith