Sciweavers

446 search results - page 13 / 90
» On Anonymity of Group Signatures
Sort
View
ITCC
2005
IEEE
15 years 3 months ago
A New Electronic Cash Model
- With the development of e-commerce, choosing a proper electronic payment method has become more and more important. Competing with other payment methods on the Internet, electron...
Xiaosong Hou, Chik How Tan
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
15 years 3 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
14 years 8 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
CCS
2010
ACM
15 years 4 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
ICIS
1997
14 years 11 months ago
A comprehensive model of anonymity in computer-supported group decision making
Drawing on recent theoretical efforts, a three dimensional model of anonymity in computer-supported group discussion is developed. Applying this model to a review of empirical lit...
Poppy L. McLeod