120
click to vote
CISC
15 years 2 months ago
2008 Springer
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
103
click to vote
CISC
15 years 2 months ago
2008 Springer
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
103
Voted
CISC
15 years 2 months ago
2008 Springer
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
98
Voted
CISC
15 years 2 months ago
2008 Springer
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
107
Voted
CISC
15 years 2 months ago
2008 Springer |