Anon-Pass: Practical Anonymous Subscriptions
暂无分享,去创建一个
Brent Waters | Emmett Witchel | Jonathan Katz | Alan M. Dunn | Michael Z Lee | Alan M Dunn | Jonathan Katz | E. Witchel | Brent Waters | Michael Z. Lee
[1] Ian Goldberg,et al. Formalizing Anonymous Blacklisting Systems , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[3] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[4] Jonathan M. McCune,et al. A Contractual Anonymity System , 2010 .
[5] Jan Camenisch,et al. Compact E-Cash , 2005, EUROCRYPT.
[6] Ivan Damgård,et al. Unclonable Group Identification , 2006, IACR Cryptol. ePrint Arch..
[7] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[8] Ben Lynn,et al. On the implementation of pairing-based cryptosystems , 2007 .
[9] Sean W. Smith,et al. Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Sean W. Smith,et al. Nymble: Anonymous IP-Address Blocking , 2007, Privacy Enhancing Technologies.
[12] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[13] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[14] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[15] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[16] Sean W. Smith,et al. PEREA: towards practical TTP-free revocation in anonymous authentication , 2008, CCS.
[17] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[18] Paul F. Syverson,et al. Unlinkable serial transactions: protocols and applications , 1999, TSEC.
[19] Nicholas Hopper,et al. Jack: scalable accumulator-based nymble system , 2010, WPES '10.
[20] Jiangtao Li,et al. A Pairing-Based DAA Scheme Further Reducing TPM Resources , 2010, TRUST.
[21] Ian Goldberg,et al. Making a Nymbler Nymble Using VERBS , 2010, Privacy Enhancing Technologies.
[22] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[23] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[24] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[25] Willy Susilo,et al. BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation , 2012, NDSS.
[26] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[27] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[28] Ivan Damgård,et al. Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals , 1988, CRYPTO.
[29] Marina Blanton,et al. Online subscriptions with anonymous access , 2008, ASIACCS '08.
[30] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.