- With the development of e-commerce, choosing a proper electronic payment method has become more and more important. Competing with other payment methods on the Internet, electron...
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
Drawing on recent theoretical efforts, a three dimensional model of anonymity in computer-supported group discussion is developed. Applying this model to a review of empirical lit...