Backes et al., 2019 - Google Patents
Membership privacy for fully dynamic group signaturesBackes et al., 2019
View PDF- Document ID
- 4316075744322016559
- Author
- Backes M
- Hanzlik L
- Schneider-Bensch J
- Publication year
- Publication venue
- Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
External Links
Snippet
Group signatures present a compromise between the traditional goals of digital signatures and the need for signer privacy, allowing for the creation of unforgeable signatures in the name of a group which reveal nothing about the actual signer's identity beyond their group …
- 238000010276 construction 0 abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Backes et al. | Membership privacy for fully dynamic group signatures | |
Camenisch et al. | Anonymous attestation using the strong diffie hellman assumption revisited | |
Tian et al. | Policy-based chameleon hash for blockchain rewriting with black-box accountability | |
Brickell et al. | Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities | |
Camenisch et al. | Universally composable direct anonymous attestation | |
Castelluccia et al. | Secret handshakes from ca-oblivious encryption | |
Francati et al. | Identity-based matchmaking encryption without random oracles | |
Ghadafi | Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability | |
Battagliola et al. | Threshold ecdsa with an offline recovery party | |
Lapon et al. | Analysis of revocation strategies for anonymous idemix credentials | |
Tian | A new strong multiple designated verifiers signature | |
Blazy et al. | Anonymous identity based encryption with traceable identities | |
Chen et al. | Non-zero inner product encryption with short ciphertexts and private keys | |
Chow | New privacy-preserving architectures for identity-/attribute-based encryption | |
Lin et al. | Jack: Scalable accumulator-based Nymble system | |
Desmoulins et al. | Direct anonymous attestations with dependent basename opening | |
Kuchta et al. | Anonymous yet traceable strong designated verifier signature | |
Bicer et al. | Versatile ABS: usage limited, revocable, threshold traceable, authority hiding, decentralized attribute based signatures | |
Crites et al. | Syra: Sybil-resilient anonymous signatures with applications to decentralized identity | |
Ghadafi | Formalizing group blind signatures and practical constructions without random oracles | |
Benjumea et al. | Fair traceable multi-group signatures | |
Hyla et al. | Implicit and explicit certificates-based encryption scheme | |
Byun | PDAKE: a provably secure PUF-based device authenticated key exchange in cloud setting | |
Burdges et al. | Ring verifiable random functions and zero-knowledge continuations | |
Blazy et al. | Traceable signature with stepping capabilities |