Home
/
Books
/
cryptography&mathematics
/
anonymous credentials
File Name
Size
Date
..
—
—
Algebraic MACs and Key-Verified Anonymous Credentials (2014) - Chase, Meiklejohn, Zaverucha.pdf.gz
508.84KB
04-07-2024 16:33:18
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation (2001) - Camenisch, Lysyanskaya.pdf.gz
234.50KB
04-07-2024 16:33:18
Anonymous Credentials Light (2012) - Lysyanskaya, Baldimtsi.pdf.gz
538.25KB
04-07-2024 16:33:18
Attribute-Based Credentials for Trust Identity in the Information Society (2015) - Rannenberg, Camenisch, Sabouri.pdf.gz
8.45MB
04-07-2024 16:33:18
Constant-Size Dynamic k-TAA [Springer version, shorter] (2006) - Au, Susilo, Mu.pdf.gz
416.91KB
04-07-2024 16:33:18
Constant-Size Dynamic k-TAA [extended] (2006) - Au, Susilo, Mu.pdf.gz
221.46KB
04-07-2024 16:33:18
Decentralised Anonymous Credentials (2013) - Garman, Green, Myers.pdf.gz
520.98KB
04-07-2024 16:33:18
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials (2002) - Camenisch, Lysyanskaya.pdf.gz
180.56KB
04-07-2024 16:33:18
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials (2007) - Camenisch, Lysyanskaya.pdf.gz
191.34KB
04-07-2024 16:33:18
Dynamic Universal Accumulators in DDH Groups and Their Application to Attribute Based Anonymous Credential Systems (2009) - Au.pdf.gz
431.45KB
04-07-2024 16:33:18
Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities (2007) - Brickwell, Li. pdf
301.54KB
04-07-2024 16:33:18
Formalizing Anonymous Blacklisting Systems (2011) - Henry, Goldberg.pdf.gz
829.09KB
04-07-2024 16:33:18
How to Win the Clone Wars Efficient Periodic n-Times Anonymous Authentication (2006) - Camenisch, Lysyanskaya, et. al.pdf.gz
280.61KB
04-07-2024 16:33:18
Hyphae Social Secret Sharing (2017) - Lovecruft, de Valence.pdf.gz
268.55KB
04-07-2024 16:33:18
Randomizable Proofs and Delegatable Anonymous Credentials.pdf.gz
226.63KB
04-07-2024 16:33:18
Security without identification Transaction systems to make big brother obsolete (1985) - Chaum.pdf.gz
1.48MB
04-07-2024 16:33:18
Short Randomizable Signatures (2015) - Pointcheval, Sanders.pdf.gz
387.12KB
04-07-2024 16:33:18
Signature Schemes and Anonymous Credentials from Bilinear Maps (2005) - Camenisch, Lysyanskaya.pdf.gz
234.11KB
04-07-2024 16:33:18
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems (2009) - Shahandashti, Safavi-Naini.pdf.gz
297.30KB
04-07-2024 16:33:18
Unlinkable Serial Transactions (1997) - Syverson.pdf.gz
120.12KB
04-07-2024 16:33:18
Unlinkable Serial Transactions Protocols and Applications (2000) - Stubblebine, Syverson, Goldschlag.pdf.gz
139.56KB
04-07-2024 16:33:18
Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists (2015) - Bayer, Groth.pdf.gz
280.00B
04-07-2024 16:33:18
10" >