Sciweavers

63 search results - page 2 / 13
» Vulnerabilities in Anonymous Credential Systems
Sort
View
SCN
2010
Springer
132views Communications» more  SCN 2010»
13 years 3 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
14 years 4 days ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
ISW
2005
Springer
13 years 11 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 12 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
ASIACRYPT
2001
Springer
13 years 9 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul