Sciweavers

1064 search results - page 2 / 213
» Cryptography from Anonymity
Sort
View
112
Voted
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 9 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
15 years 8 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
104
Voted
PAIRING
2009
Springer
103views Cryptology» more  PAIRING 2009»
15 years 10 months ago
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Georg Fuchsbauer, David Pointcheval
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
15 years 9 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget