Sciweavers

446 search results - page 21 / 90
» On Anonymity of Group Signatures
Sort
View
CN
2010
164views more  CN 2010»
14 years 12 months ago
Attribute-based on-demand multicast group setup with membership anonymity
In many applications, it is desired to dynamically establish temporary multicast groups for secure message delivery. It is also often the case that the group membership informatio...
Shucheng Yu, Kui Ren, Wenjing Lou
CORR
2010
Springer
79views Education» more  CORR 2010»
14 years 12 months ago
Providing Data Group Anonymity Using Concentration Differences
Public access to digital data can turn out to be a cause of undesirable information disclosure. That's why it is vital to somehow protect the data before publishing. There are...
Oleg Chertov, Dan Tavrov
ACISP
2001
Springer
15 years 4 months ago
A Practical English Auction with One-Time Registration
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidd...
Kazumasa Omote, Atsuko Miyaji
EUROPKI
2009
Springer
14 years 9 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
IJNSEC
2011
143views more  IJNSEC 2011»
14 years 6 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma