Breaking and Fixing Anonymous Credentials for the Cloud
From MaRDI portal
Publication:3297625
DOI10.1007/978-3-030-31578-8_14zbMath1437.68053OpenAlexW2980288443MaRDI QIDQ3297625
Publication date: 20 July 2020
Published in: Cryptology and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-31578-8_14
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Privacy of data (68P27)
Related Items (2)
Issuer-hiding attribute-based credentials ⋮ Attribute-based anonymous credential: optimization for single-use and multi-use
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Composable and Modular Anonymous Credentials: Definitions and Practical Constructions
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Practical Round-Optimal Blind Signatures in the Standard Model
- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings
- Structure-Preserving Signatures and Commitments to Group Elements
- Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
- Advances in Cryptology – CRYPTO 2004
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- An Efficient Self-blindable Attribute-Based Credential Scheme
- Towards attribute-based credentials in the cloud
This page was built for publication: Breaking and Fixing Anonymous Credentials for the Cloud