Sciweavers

152 search results - page 1 / 31
» Anonymous k -Show Credentials
Sort
View
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
ISPEC
2007
Springer
13 years 11 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
IAT
2006
IEEE
13 years 11 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...
ENTCS
2008
75views more  ENTCS 2008»
13 years 5 months ago
Vulnerabilities in Anonymous Credential Systems
Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V...
SCN
2010
Springer
132views Communications» more  SCN 2010»
13 years 2 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente