Sciweavers

11 search results - page 1 / 3
» Dynamic k-Times Anonymous Authentication
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
14 years 4 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
ASIACRYPT
2004
Springer
14 years 4 months ago
k-Times Anonymous Authentication (Extended Abstract)
Isamu Teranishi, Jun Furukawa, Kazue Sako
FC
1999
Springer
160views Cryptology» more  FC 1999»
14 years 3 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
HUC
2007
Springer
14 years 5 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 11 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente