Sciweavers

1064 search results - page 12 / 213
» Cryptography from Anonymity
Sort
View
JCS
2006
113views more  JCS 2006»
15 years 3 months ago
Blind Electronic Commerce
Privacy in Electronic Commerce transactions is the subject of ever increasing research. However, many challenges remain to be overcome. For example, let us consider a customer, Si...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
140
Voted
EUROPKI
2007
Springer
15 years 9 months ago
On Partial Anonymity in Secret Sharing
Abstract. Anonymous secret sharing schemes allow a secret to be recovered from shares regardless of the identity of shareholders. Besides being interesting in its own right, this p...
Vanesa Daza, Josep Domingo-Ferrer
128
Voted
PROVSEC
2009
Springer
15 years 10 months ago
Anonymous Signatures Revisited
Abstract. We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [12], and then further developed by Fischlin [6] and Zhang and Imai [13]. ...
Vishal Saraswat, Aaram Yun
119
Voted
AINA
2008
IEEE
15 years 10 months ago
A Concept of an Anonymous Direct P2P Distribution Overlay System
The paper introduces a peer-to-peer system called P2PRIV (peer-to-peer direct and anonymous distribution overlay). Basic novel features of P2PRIV are: (i) a peer-to-peer parallel ...
Igor Margasinski, Michal Pióro
109
Voted
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
15 years 9 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...