Sciweavers

1064 search results - page 28 / 213
» Cryptography from Anonymity
Sort
View
JCP
2006
118views more  JCP 2006»
13 years 8 months ago
Online Mutual Aid, "RAQ": A Study of Anonymous and Traceable Interactions
Our study proposes mutual aid platforms for the resolution of uncommon or non-conforming cases in both administrative and commercial procedures. On reviewing inter-customer interac...
Akiko Orita
CANS
2010
Springer
146views Cryptology» more  CANS 2010»
13 years 6 months ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CERA
2004
89views more  CERA 2004»
13 years 7 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
IPL
2000
101views more  IPL 2000»
13 years 7 months ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
CRYPTO
2006
Springer
140views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Lattice-Based Cryptography
We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with some recent constructions of very efficient cryptogr...
Oded Regev