Privacy Pass: Bypassing Internet Challenges Anonymously
暂无分享,去创建一个
Ian Goldberg | Nick Sullivan | Alex Davidson | Filippo Valsorda | George Tankersley | I. Goldberg | Nick Sullivan | Alex Davidson | George Tankersley | F. Valsorda | N. Sullivan | G. Tankersley
[1] Amit Sahai,et al. Round Optimal Blind Signatures , 2011, CRYPTO.
[2] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[3] Sanjam Garg,et al. Efficient Round Optimal Blind Signatures , 2014, IACR Cryptol. ePrint Arch..
[4] Ian Goldberg,et al. Extending Nymble-like Systems , 2011, 2011 IEEE Symposium on Security and Privacy.
[5] Florian Kerschbaum,et al. Privacy-preserving billing for e-ticketing systems in public transportation , 2013, IACR Cryptol. ePrint Arch..
[6] Daniel Moore,et al. EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves , 2017, IACR Cryptol. ePrint Arch..
[7] Nicholas Hopper,et al. BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper) , 2011, Financial Cryptography.
[8] Ahmad-Reza Sadeghi,et al. User Privacy in Transport Systems Based on RFID E-Tickets , 2008, PiLBA.
[9] Aggelos Kiayias,et al. Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[10] David Chaum,et al. Blind Signature System , 1983, CRYPTO.
[11] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[12] Aggelos Kiayias,et al. Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model , 2014, ASIACRYPT.
[13] Prateek Mittal,et al. TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems , 2017, ArXiv.
[14] Moni Naor,et al. Can NSEC5 be practical for DNSSEC deployments? , 2017, IACR Cryptol. ePrint Arch..
[15] Markus Jakobsson,et al. Security of Signed ElGamal Encryption , 2000, ASIACRYPT.
[16] Georg Fuchsbauer,et al. Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions , 2016, IACR Cryptol. ePrint Arch..
[17] Ryan Henry,et al. Efficient Zero-Knowledge Proofs and Applications , 2014 .
[18] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[19] Kevin Fu,et al. Privacy for Public Transportation , 2006, Privacy Enhancing Technologies.
[20] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[21] Christian Grothoff,et al. GNU Taler: Ethical Online Payments for the Internet Age , 2016, ERCIM News.
[22] Ian Goldberg,et al. Formalizing Anonymous Blacklisting Systems , 2011, 2011 IEEE Symposium on Security and Privacy.
[23] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[24] Ian Goldberg,et al. Batch Proofs of Partial Knowledge , 2013, ACNS.
[25] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[26] Markus Rückert,et al. Lattice-based Blind Signatures , 2010, Algorithms and Number Theory.