Sciweavers

212 search results - page 1 / 43
» Anonymity and k-Choice Identities
Sort
View
CISC
2007
Springer
120views Cryptology» more  CISC 2007»
13 years 11 months ago
Anonymity and k-Choice Identities
Jacek Cichon, Miroslaw Kutylowski
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
13 years 6 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
ENTCS
2006
117views more  ENTCS 2006»
13 years 4 months ago
Probabilistic and Nondeterministic Aspects of Anonymity
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
CISSE
2008
Springer
13 years 6 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome