An Efficient Signature Scheme for Anonymous Credentials
暂无分享,去创建一个
Jheng-Jia Huang | Chun-I Fan | Yi-Fan Tseng | Hiroaki Kikuchi | Chien-Nan Wu | Hiroaki Kikuchi | Yi-Fan Tseng | Chun-I Fan | Chien-Nan Wu | Jheng-Jia Huang
[1] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[2] Tatsuaki Okamoto,et al. An Efficient Anonymous Credential System , 2008, Financial Cryptography.
[3] Mohammed Alodib. Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services , 2015, Int. J. Networked Distributed Comput..
[4] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[5] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[6] Lidong Chen. Access with Pseudonyms , 1995, Cryptography: Policy and Algorithms.
[7] David Chaum,et al. A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations , 1986, CRYPTO.
[8] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[9] M. Scott. Implementing cryptographic pairings , 2007 .
[10] Amit Sahai,et al. Pseudonym Systems , 1999, Selected Areas in Cryptography.
[11] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[12] Khalid Alnafjan,et al. Empirical Study for Semantic Annotation of Web Services , 2014, Int. J. Networked Distributed Comput..
[13] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[14] Sean W. Smith,et al. Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.
[15] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[16] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[17] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[18] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[19] Chanathip Namprempre,et al. The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme , 2003, Journal of Cryptology.
[20] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[21] Ivan Damgård,et al. Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals , 1988, CRYPTO.