Sciweavers

18 search results - page 2 / 4
» Anonymity from Asymmetry: New Constructions for Anonymous HI...
Sort
View
ISW
2010
Springer
13 years 3 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 5 months ago
Multi-Designated Verifiers Signatures Revisited
Multi-Designated Verifier Signatures (MDVS) are privacy-oriented signatures that can only be verified by a set of users specified by the signer. We propose two new generic constru...
Sherman S. M. Chow
ASIACRYPT
2001
Springer
13 years 9 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul
MST
2007
122views more  MST 2007»
13 years 4 months ago
Rendezvous and Election of Mobile Agents: Impact of Sense of Direction
Consider a collection of r identical asynchronous mobile agents dispersed on an arbitrary anonymous network of size n. The agents all execute the same protocol and move from node ...
Lali Barrière, Paola Flocchini, Pierre Frai...
ACISP
2007
Springer
13 years 11 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng