Sciweavers

1064 search results - page 6 / 213
» Cryptography from Anonymity
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
A Mutual Anonymous Peer-to-Peer Protocol Design
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sharing pattern and powerful query search scheme. However, decentralized P2P archi...
Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lion...
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 2 months ago
Relations Among Privacy Notions
This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistingu...
Jens-Matthias Bohli, Andreas Pashalidis
ACNS
2008
Springer
106views Cryptology» more  ACNS 2008»
14 years 2 months ago
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Ivan Damgård, Lars R. Knudsen, Søren ...
ACMICEC
2004
ACM
128views ECommerce» more  ACMICEC 2004»
14 years 1 months ago
Blind sales in electronic commerce
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
FMICS
2010
Springer
13 years 9 months ago
A Formal Model of Identity Mixer
Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate....
Jan Camenisch, Sebastian Mödersheim, Dieter S...