Sciweavers

157 search results - page 5 / 32
» Anonymous Signatures Revisited
Sort
View
145
Voted
CCS
2004
ACM
15 years 8 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
133
Voted
INDOCRYPT
2004
Springer
15 years 8 months ago
Revisiting Fully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both...
Javier Herranz, Germán Sáez
ISW
1999
Springer
15 years 7 months ago
Cryptanalysis of Two Group Signature Schemes
Abstract. Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a...
Marc Joye, Seungjoo Kim, Narn-Yih Lee
118
Voted
EUROCRYPT
2007
Springer
15 years 9 months ago
Mesh Signatures
sion of an extended abstract to be published in Advances in Cryptology—EUROCRYPT 2007, Springer-Verlag, 2007. Available online from the IACR Cryptology ePrint Archive as Report 2...
Xavier Boyen
108
Voted
ECSCW
2007
15 years 4 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi