Sciweavers

34 search results - page 3 / 7
» Revocable Anonymity
Sort
View
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 6 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
ISECS
2008
IEEE
14 years 12 days ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
13 years 11 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen
CCS
2008
ACM
13 years 8 months ago
PEREA: towards practical TTP-free revocation in anonymous authentication
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...