Anonymous ae
… Traditional formulations of authenticated encryption (AE) implicitly assume that auxiliary …
introduce a primitive we call anonymous nonce-based AE, or anAE. Unlike traditional AE [6, 10, …
introduce a primitive we call anonymous nonce-based AE, or anAE. Unlike traditional AE [6, 10, …
k-Times Anonymous Authentication
I Teranishi, J Furukawa, K Sako - … on the Theory and Application of …, 2004 - Springer
We propose an authentication scheme in which users can be authenticated anonymously
so long as times that they are authenticated is within an allowable number. The proposed …
so long as times that they are authenticated is within an allowable number. The proposed …
Anonymous authentication
Y Lindell - Journal of Privacy and Confidentiality, 2011 - journalprivacyconfidentiality.org
… We use A to construct an adversary AE that attacks the encryption scheme. We will show
that AE can succeed in the following experiment with probability ϵ(n): Adversary AE is given l …
that AE can succeed in the following experiment with probability ϵ(n): Adversary AE is given l …
Efficient attributes for anonymous credentials
J Camenisch, T Groß - ACM Transactions on Information and System …, 2012 - dl.acm.org
… We extend the Camenisch-Lysyanskaya anonymous credential system such that selective
… an attribute e that is contained in {e1, ...., el}, then there exists an integer a such that ae = …
… an attribute e that is contained in {e1, ...., el}, then there exists an integer a such that ae = …
Direct anonymous attestation
E Brickell, J Camenisch, L Chen - … of the 11th ACM conference on …, 2004 - dl.acm.org
… DAAsignature (note that (Z/Ae) is known to the host). Note that the SPK produced by the
TPM is not anonymous (even with a random ζ) as the value (Z/Ae) would fully identify the TPM. …
TPM is not anonymous (even with a random ζ) as the value (Z/Ae) would fully identify the TPM. …
Anonymous and confidential file sharing over untrusted clouds
… an anonymous access control scheme that leverages SGX as TEE only for a narrow
scope and deployment: enforcing anonymity … (AE) and trusted execution environments (TEEs). …
scope and deployment: enforcing anonymity … (AE) and trusted execution environments (TEEs). …
Blacklistable anonymous credentials: blocking misbehaving users without TTPs
… We present the first anonymous credential system in which services can “blacklist” … the
anonymity of their well-behaving users. By guaranteeing anonymity to all users, anonymous …
anonymity of their well-behaving users. By guaranteeing anonymity to all users, anonymous …
An anonymous communication model for privacy-enhanced location based service using an echo agent
EA Cho, CJ Moon, HS Im, DK Baik - Proceedings of the 3rd International …, 2009 - dl.acm.org
… powerful anonymity, in which the LBS is used through an anonymous communication model
… the proposed anonymous communication model provides powerful anonymity by generating…
… the proposed anonymous communication model provides powerful anonymity by generating…
Quantum anonymous transmissions
M Christandl, S Wehner - International conference on the theory and …, 2005 - Springer
… As discussed earlier, AE and ANON(b) do not leak any information about Alice or Bob. Since
no additional information is revealed during the teleportation step, it follows that ANONQ(|φ…
no additional information is revealed during the teleportation step, it follows that ANONQ(|φ…
Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
E Brickell, J Li - IEEE Transactions on Dependable and Secure …, 2011 - ieeexplore.ieee.org
… We use Æ to denote the “signature of knowledge” of the above protocol. The issuer records
ðK;U;ÆÞ in its database, so that he has the ability to revoke this user in the future, see …
ðK;U;ÆÞ in its database, so that he has the ability to revoke this user in the future, see …