Sciweavers

1064 search results - page 2 / 213
» Cryptography from Anonymity
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
13 years 10 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
13 years 10 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
13 years 11 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget