139
click to vote
CISC
15 years 4 months ago
2008 Springer
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
121
click to vote
CISC
15 years 4 months ago
2008 Springer
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
118
click to vote
CISC
15 years 4 months ago
2008 Springer
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
117
Voted
CISC
15 years 4 months ago
2008 Springer
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
119
Voted
CISC
15 years 4 months ago
2008 Springer |