Sciweavers

446 search results - page 33 / 90
» On Anonymity of Group Signatures
Sort
View
ASIACRYPT
2010
Springer
14 years 9 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
ICIP
2003
IEEE
16 years 1 months ago
Multitemporal geospatial query grouping using correlation signatures
With recent advances in temporal and spatiotemporal databases, user demands are becoming more complex. As a result, simple queries are replaced by complex multitemporal query scen...
Giorgos Mountrakis, Peggy Agouris, Anthony Stefani...
NDSS
2002
IEEE
15 years 4 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
15 years 5 months ago
Optimization of the MOVA Undeniable Signature Scheme
This article presents optimization results on the recent MOVA undeniable signature scheme presented by Monnerat and Vaudenay at PKC ’04 as well as its generalization proposed at ...
Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
ICICS
2007
Springer
15 years 6 months ago
Short Group Signature Without Random Oracles
Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin