Sciweavers

181 search results - page 20 / 37
» Anonymous Proxy Signatures
Sort
View
89
Voted
AFRICACRYPT
2009
Springer
15 years 7 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
56
Voted
ISCI
2010
66views more  ISCI 2010»
14 years 11 months ago
Hidden attribute-based signatures without anonymity revocation
Jin Li, Kwangjo Kim
96
Voted
SCN
2010
Springer
147views Communications» more  SCN 2010»
14 years 11 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström