Sciweavers

9 search results - page 1 / 2
» The Semi-Generic Group Model and Applications to Pairing-Bas...
Sort
View
98
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
Tibor Jager, Andy Rupp
SCN
2010
Springer
147views Communications» more  SCN 2010»
15 years 1 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
128
Voted
EUROCRYPT
2009
Springer
16 years 4 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
112
Voted
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 9 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
154
Voted
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 9 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki