Sciweavers

99 search results - page 5 / 20
» An Efficient Anonymous Credential System
Sort
View
AFRICACRYPT
2009
Springer
14 years 2 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
ENTCS
2008
75views more  ENTCS 2008»
13 years 7 months ago
Vulnerabilities in Anonymous Credential Systems
Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V...
WPES
2003
ACM
14 years 22 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
CCS
2007
ACM
14 years 1 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...