Sciweavers

169 search results - page 19 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
129
Voted
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
15 years 10 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
IACR
2011
137views more  IACR 2011»
14 years 4 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
146
Voted
MDAI
2005
Springer
15 years 10 months ago
Cryptosystems Based on Elliptic Curve Pairing
The purpose of this paper is to introduce pairing over elliptic curve and apply it to ID based key agreement schemes and privacy preserving key agreement schemes. The key words her...
Eiji Okamoto, Takeshi Okamoto
ICICS
2003
Springer
15 years 10 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
156
Voted
ICML
2010
IEEE
15 years 3 months ago
Online Prediction with Privacy
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss at each time while the loss cannot be disclosed to others fo...
Jun Sakuma, Hiromi Arai