[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Backes et al., 2019 - Google Patents

Membership privacy for fully dynamic group signatures

Backes et al., 2019

View PDF
Document ID
4316075744322016559
Author
Backes M
Hanzlik L
Schneider-Bensch J
Publication year
Publication venue
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

Group signatures present a compromise between the traditional goals of digital signatures and the need for signer privacy, allowing for the creation of unforgeable signatures in the name of a group which reveal nothing about the actual signer's identity beyond their group …
Continue reading at eprint.iacr.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Backes et al. Membership privacy for fully dynamic group signatures
Camenisch et al. Anonymous attestation using the strong diffie hellman assumption revisited
Tian et al. Policy-based chameleon hash for blockchain rewriting with black-box accountability
Brickell et al. Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
Camenisch et al. Universally composable direct anonymous attestation
Castelluccia et al. Secret handshakes from ca-oblivious encryption
Francati et al. Identity-based matchmaking encryption without random oracles
Ghadafi Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability
Battagliola et al. Threshold ecdsa with an offline recovery party
Lapon et al. Analysis of revocation strategies for anonymous idemix credentials
Tian A new strong multiple designated verifiers signature
Blazy et al. Anonymous identity based encryption with traceable identities
Chen et al. Non-zero inner product encryption with short ciphertexts and private keys
Chow New privacy-preserving architectures for identity-/attribute-based encryption
Lin et al. Jack: Scalable accumulator-based Nymble system
Desmoulins et al. Direct anonymous attestations with dependent basename opening
Kuchta et al. Anonymous yet traceable strong designated verifier signature
Bicer et al. Versatile ABS: usage limited, revocable, threshold traceable, authority hiding, decentralized attribute based signatures
Crites et al. Syra: Sybil-resilient anonymous signatures with applications to decentralized identity
Ghadafi Formalizing group blind signatures and practical constructions without random oracles
Benjumea et al. Fair traceable multi-group signatures
Hyla et al. Implicit and explicit certificates-based encryption scheme
Byun PDAKE: a provably secure PUF-based device authenticated key exchange in cloud setting
Burdges et al. Ring verifiable random functions and zero-knowledge continuations
Blazy et al. Traceable signature with stepping capabilities