Anonymous ae

J Chan, P Rogaway - Advances in Cryptology–ASIACRYPT 2019: 25th …, 2019 - Springer
… Traditional formulations of authenticated encryption (AE) implicitly assume that auxiliary …
introduce a primitive we call anonymous nonce-based AE, or anAE. Unlike traditional AE [6, 10, …

k-Times Anonymous Authentication

I Teranishi, J Furukawa, K Sako - … on the Theory and Application of …, 2004 - Springer
We propose an authentication scheme in which users can be authenticated anonymously
so long as times that they are authenticated is within an allowable number. The proposed …

Anonymous authentication

Y Lindell - Journal of Privacy and Confidentiality, 2011 - journalprivacyconfidentiality.org
… We use A to construct an adversary AE that attacks the encryption scheme. We will show
that AE can succeed in the following experiment with probability ϵ(n): Adversary AE is given l …

Efficient attributes for anonymous credentials

J Camenisch, T Groß - ACM Transactions on Information and System …, 2012 - dl.acm.org
… We extend the Camenisch-Lysyanskaya anonymous credential system such that selective
… an attribute e that is contained in {e1, ...., el}, then there exists an integer a such that ae = …

Direct anonymous attestation

E Brickell, J Camenisch, L Chen - … of the 11th ACM conference on …, 2004 - dl.acm.org
… DAAsignature (note that (Z/Ae) is known to the host). Note that the SPK produced by the
TPM is not anonymous (even with a random ζ) as the value (Z/Ae) would fully identify the TPM. …

Anonymous and confidential file sharing over untrusted clouds

S Contiu, S Vaucher, R Pires, M Pasin… - … 38th Symposium on …, 2019 - ieeexplore.ieee.org
… an anonymous access control scheme that leverages SGX as TEE only for a narrow
scope and deployment: enforcing anonymity … (AE) and trusted execution environments (TEEs). …

Blacklistable anonymous credentials: blocking misbehaving users without TTPs

PP Tsang, MH Au, A Kapadia, SW Smith - Proceedings of the 14th ACM …, 2007 - dl.acm.org
… We present the first anonymous credential system in which services can “blacklist” … the
anonymity of their well-behaving users. By guaranteeing anonymity to all users, anonymous

An anonymous communication model for privacy-enhanced location based service using an echo agent

EA Cho, CJ Moon, HS Im, DK Baik - Proceedings of the 3rd International …, 2009 - dl.acm.org
… powerful anonymity, in which the LBS is used through an anonymous communication model
… the proposed anonymous communication model provides powerful anonymity by generating…

Quantum anonymous transmissions

M Christandl, S Wehner - International conference on the theory and …, 2005 - Springer
… As discussed earlier, AE and ANON(b) do not leak any information about Alice or Bob. Since
no additional information is revealed during the teleportation step, it follows that ANONQ(|φ…

Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities

E Brickell, J Li - IEEE Transactions on Dependable and Secure …, 2011 - ieeexplore.ieee.org
… We use Æ to denote the “signature of knowledge” of the above protocol. The issuer records
ðK;U;ÆÞ in its database, so that he has the ability to revoke this user in the future, see …