Sciweavers

63 search results - page 4 / 13
» Vulnerabilities in Anonymous Credential Systems
Sort
View
AFRICACRYPT
2009
Springer
15 years 4 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
FC
2008
Springer
96views Cryptology» more  FC 2008»
14 years 10 months ago
An Efficient Anonymous Credential System
Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto
WPES
2003
ACM
15 years 2 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
15 years 10 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger