Skip to main content

and
  1. Chapter and Conference Paper

    Credential Authenticated Identification and Key Exchange

    This paper initiates a study of two-party identification and key-exchange protocols in which users authenticate themselves by proving possession of credentials satisfying arbitrary policies, instead of using t...

    Jan Camenisch, Nathalie Casati, Thomas Gross in Advances in Cryptology – CRYPTO 2010 (2010)