Sadeghi, S. ACM, Concepts and languages for privacy-preserving attribute-based authentication. Springer, Practical yet universally composable two-server password-authenticated secret sharing.
Yu, G. Danezis, V.
ACM Press, Fully anonymous attribute tokens from lattices. Visconti, R.
Enderlein, and Gregory Neven. Oblivious transfer with hidden access control from attribute-based encryption. Oblivious transfer with hidden access control policies. Catalano, N.
Fazio, R. Gennaro and A.
Claudio A. Fine-grained disclosure of access policies. Soriano, S. Qing, J. Smart, and Bogdan Warinschi. Get Shorty via group signatures without encryption.
Garay and R. Downstream usage control. A card requirements language enabling privacy-preserving access control. Joshi and B. Unlinkable priced oblivious transfer with rechargeable wallets.
Jan Camenisch and Gregory Neven. Saving on-line privacy. Bezzi, P. Duquenoy, S. Hansen, and G. Robust encryption. Oblivious transfer with access control. Al-Shaer, S. Jha, and A. Gregory Neven. Efficient sequential aggregate signed data.
Generalized key delegation for hierarchical identity-based encryption. Biskup, and J. Unrestricted aggregate signatures. Arge, C. Cachin, T. Jurdzinski, and A. James Birkett, Alexander W. Dent, Gregory Neven and Jacob C. Broadcasting messages. Signing protocol V1: - Achieved restricted usage of credential.
Verifying protocol V2: - Adapted from V1 and revocation request Tracing and Revocation protocol: - Tracing of the fraud vehicle - Revocation of the credential. Used domain pseudonyms for binding it to a time frame.
Microsoft Research: Summer December 4 Wednesday. Fully anonymous attribute tokens from lattices. Privacy-preserving auditing for attribute-based credentials. Program
Generating tracing ID. Randomizing tracing ID during signing protocol. Contributed in detecting the fraud at the receiver side.
Menezes, Paul C. Jan Camenisch and Anna Lysyanskaya. Springer Verlag, DAA: Fixing the pairing based protocols. Chen, P.
Morrissey and N. Teranishi, J. Furukawa, and K. Commitment schemes and zero-knowledge protocols, , I. Anna Lysyanskaya.
Anna Lysyanskaya. Submitted to Anna Lysyans k aya In this thesis, we study both the uses that signature schemes find in protocols, and. cс Anna Lysyanskaya, MCMXCIX. All rights reserved. paper and electronic copies of this thesis document in whole or in part, and to grant others the right to do.
Bart Preneel. Smart card integration in the pseudonym system idemix, Luuk Danes, Master Thesis 18 December , University of Groningen, faculty of mathematics and natural sciences. In this thesis, we study both the uses that signature schemes find in protocols, and the design of signature schemes suitable for a broad range of applications.
pierreducalvet.ca/map1.php An important application of digital signature schemes is an anonymous credential system. View PDF. Save to Library. Create Alert. Share This Paper. Figures and Topics from this paper.