Sciweavers

1064 search results - page 3 / 213
» Cryptography from Anonymity
Sort
View
ACNS
2004
Springer
92views Cryptology» more  ACNS 2004»
13 years 10 months ago
Private Keyword-Based Push and Pull with Applications to Anonymous Communication
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn ...
EUROCRYPT
2007
Springer
13 years 11 months ago
Divisible E-Cash Systems Can Be Truly Anonymous
This paper presents an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value 2L that he can parceled and spend anonymously and unlinkably. ...
Sébastien Canard, Aline Gouget
ICDCS
2005
IEEE
13 years 11 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake
EUROCRYPT
2007
Springer
13 years 11 months ago
Mesh Signatures
sion of an extended abstract to be published in Advances in Cryptology—EUROCRYPT 2007, Springer-Verlag, 2007. Available online from the IACR Cryptology ePrint Archive as Report 2...
Xavier Boyen
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
13 years 11 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate