Sciweavers

19 search results - page 3 / 4
» An Anonymous Auction Protocol Based on GDH Assumption
Sort
View
CCS
2008
ACM
13 years 8 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
EUROPAR
2010
Springer
13 years 7 months ago
Value-Based Sequential Consistency for Set Objects in Dynamic Distributed Systems
This paper introduces a set object, namely a shared object that allows processes to add and remove values as well as take a snapshot of its content. A new consistency condition su...
Roberto Baldoni, Silvia Bonomi, Michel Raynal
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 7 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
STOC
1999
ACM
122views Algorithms» more  STOC 1999»
13 years 10 months ago
Oblivious Transfer and Polynomial Evaluation
Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input is a polynomial P, and a receiver whose input is a value α. At the end of the protocol t...
Moni Naor, Benny Pinkas
TROB
2008
159views more  TROB 2008»
13 years 6 months ago
Distributed Connectivity Control of Mobile Networks
Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile senso...
Michael M. Zavlanos, George J. Pappas