Sciweavers

32 search results - page 1 / 7
» Efficient attributes for anonymous credentials
Sort
View
CANS
2010
Springer
146views Cryptology» more  CANS 2010»
13 years 2 months ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CCS
2008
ACM
13 years 6 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 5 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
SCN
2010
Springer
132views Communications» more  SCN 2010»
13 years 2 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
AFRICACRYPT
2009
Springer
13 years 11 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini