Sciweavers

1064 search results - page 2 / 213
» Cryptography from Anonymity
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 5 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
15 years 5 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
71
Voted
PKC
2005
Springer
73views Cryptology» more  PKC 2005»
15 years 5 months ago
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity
Ryotaro Hayashi, Keisuke Tanaka
83
Voted
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
15 years 6 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget