We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classiĀ£cation of such assumptions based on the complexity of falsifying...
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Many proposed low-latency anonymous communication systems have used various ļ¬ow transformations such as trafļ¬c padding, adding cover trafļ¬c (or bogus packets), packet droppi...