Sciweavers

63 search results - page 5 / 13
» Vulnerabilities in Anonymous Credential Systems
Sort
View
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 10 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
CCS
2008
ACM
13 years 11 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
CCS
2007
ACM
14 years 4 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
CMS
2006
116views Communications» more  CMS 2006»
13 years 11 months ago
A Fair Anonymous Submission and Review System
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more pri...
Vincent Naessens, Liesje Demuynck, Bart De Decker