Sciweavers

1064 search results - page 2 / 213
» Cryptography from Anonymity
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 10 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
130
Voted
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
15 years 10 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
105
Voted
PKC
2005
Springer
73views Cryptology» more  PKC 2005»
15 years 10 months ago
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity
Ryotaro Hayashi, Keisuke Tanaka
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
15 years 11 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget