Sciweavers

99 search results - page 6 / 20
» An Efficient Anonymous Credential System
Sort
View
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 27 days ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
CMS
2006
116views Communications» more  CMS 2006»
13 years 9 months ago
A Fair Anonymous Submission and Review System
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more pri...
Vincent Naessens, Liesje Demuynck, Bart De Decker
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 1 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
ESORICS
2007
Springer
13 years 11 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
DIM
2008
ACM
13 years 9 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash