Sciweavers

1064 search results - page 2 / 213
» Cryptography from Anonymity
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 11 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
134
Voted
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
15 years 10 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
120
Voted
PAIRING
2009
Springer
103views Cryptology» more  PAIRING 2009»
15 years 12 months ago
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Georg Fuchsbauer, David Pointcheval
137
Voted
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
15 years 11 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget