Sciweavers

99 search results - page 3 / 20
» An Efficient Anonymous Credential System
Sort
View
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 10 days ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
14 years 10 days ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
ISW
2005
Springer
13 years 11 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi
IJNSEC
2008
112views more  IJNSEC 2008»
13 years 5 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 3 days ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith