Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
From MaRDI portal
Publication:3623053
DOI10.1007/978-3-642-00862-7_20zbMath1237.94048OpenAlexW2158706160MaRDI QIDQ3623053
Willy Susilo, Yi Mu, Man Ho Au, Patrick P. Tsang
Publication date: 29 April 2009
Published in: Topics in Cryptology – CT-RSA 2009 (Search for Journal in Brave)
Full work available at URL: https://ro.uow.edu.au/cgi/viewcontent.cgi?article=9405&context=infopapers
Related Items (11)
Cryptanalysis of a dynamic universal accumulator over bilinear groups ⋮ UC Updatable Databases and Applications ⋮ A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials ⋮ Dynamic universal accumulator with batch update over bilinear groups ⋮ Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes ⋮ Zero-Knowledge Accumulators and Set Algebra ⋮ Efficient attribute-based signature for monotone predicates ⋮ Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives ⋮ Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems ⋮ Efficient Asynchronous Accumulators for Distributed PKI ⋮ New constructions of hinting PRGs, OWFs with encryption, and more
Cites Work
- Constant-Size Dynamic k-TAA
- Universal Accumulators with Efficient Nonmembership Proofs
- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
- The Knowledge Complexity of Interactive Proof Systems
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- P-signatures and Noninteractive Anonymous Credentials
- Topics in Cryptology – CT-RSA 2005
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems