Showing results 1 to 8 of 8
Title | Author(s) | Issue Date | |
---|---|---|---|
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs Journal:ACM Transactions on Information and System Security | 2010 | ||
Blacklistable anonymous credentials: Blocking misbehaving users without ttps Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2007 | ||
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users Journal:ACM Transactions on Information and System Security | 2011 | ||
PEREA: Towards practical TTP-free revocation in anonymous authentication Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2008 | ||
Separable linkable threshold ring signatures Proceeding/Conference:Cryptology - INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings | 2004 | ||
Short linkable ring signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 |