搜索结果: 1-15 共查到“军事学 anonymous credentials”相关记录22条 . 查询时间(0.156 秒)
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)
Attribute-based credentials Privacy-preserving authentication Strong authentication
2019/9/23
In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selec...
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Privacy anonymous credentials authentication
2019/5/13
Cryptographic anonymous credential schemes allow users to prove their personal attributes, such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their privacy, as ...
Non-Interactive Keyed-Verification Anonymous Credentials
Anonymous credentials keyed-verification anonymous credentials non-interactive anonymous credentials
2019/2/27
Anonymous credential (AC) schemes are protocols which allow for authentication of authorized users without compromising their privacy. Of particular interest are non-interactive anonymous credential (...
Updatable Anonymous Credentials and Applications to Incentive Systems
anonymity anonymous credentials incentive systems
2019/2/25
In this paper, we introduce updatable anonymous credential systems (UACS) and use them to construct a new privacy-preserving incentive system. In a UACS, a user holding a credential certifying some at...
Fully-Featured Anonymous Credentials with Reputation System
Anonymous Credential System Authentication Privacy
2018/11/16
We present CLARCCLARC (Cryptographic Library for Anonymous Reputation and Credentials), an anonymous credentials system (ACS) combined with an anonymous reputation system.
Delegatable Anonymous Credentials from Mercurial Signatures
Anonymous credentials signature schemes generic group model
2018/11/8
In a delegatable anonymous credential system, participants may use their credentials anonymously as well as anonymously delegate them to other participants. Such systems are more usable than tradition...
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
delegatable credentials, anonymous credentials, attribute-based credentials
2018/4/17
In this paper, we introduce the notion of delegatable attribute-based anonymous credentials (DAAC). Such systems offer fine-grained anonymous access control and they give the credential holder the abi...
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)
Formal analysis Anonymous Credential ProVerif
2017/11/21
This paper firstly introduces a novel security definition for BLAC-like schemes (BLAC represents TTP-free BLacklist-able Anonymous Credentials) in the symbolic model using applied pi calculus, which i...
Decentralized Blacklistable Anonymous Credentials with Reputation
Anonymous Credential Blockchain Technique Accountable Anonymity
2017/5/5
Blacklistable anonymous credential systems provide service providers with a way to authenticate users according to their historical behaviors, while guaranteeing that all users can access services in ...
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
Proxy signatures anonymous credentials cryptographic protocols
2016/1/23
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this deleg...
Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Public key cryptography structure-preserving signatures attribute-based anonymous credentials
2016/1/7
Structure-preserving signatures are a quite recent but important building block for many
cryptographic protocols. In this paper, we introduce a new type of structure-preserving signatures, which
all...
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
(Fully) structure preserving signatures vector commitments anonymous credentials
2015/12/29
It takes time for theoretical advances to get used in practical schemes. Anonymous credential
schemes are no exception. For instance, existing schemes suited for real-world use
lack formal, composab...
Algebraic MACs and Keyed-Verification Anonymous Credentials
cryptographic protocols anonymous credentials
2014/3/10
We consider the problem of constructing anonymous credentials for use in a setting where the issuer of credentials is also the verifier, or more generally where the issuer and verifier have a shared k...
Anonymous credentials provide a powerful tool for making assertions about identity while maintaining privacy. However, a limitation of today's anonymous credential systems is the need for a trusted cr...
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
malleability signatures anonymity
2013/4/18
A signature scheme is malleable if, on input a message m and a signature $\sigma$, it is possible to efficiently compute a signature $\sigma'$ on a related message $m' = T(m)$, for a transformation T ...