We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,198 results
  1. SoK: Anonymous Credentials

    Anonymous credentials are a powerful tool for making assertions about identity while maintaining privacy and have been the subject of study for many...
    Saqib A. Kakvi, Keith M. Martin, ... Elizabeth A. Quaglia in Security Standardisation Research
    Conference paper 2023
  2. Scored Anonymous Credentials

    Securely maintaining “credits” of users judging their behavior in past authenticated sessions is vital to encourage user participation, but doing it...
    Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen in Applied Cryptography and Network Security
    Conference paper 2023
  3. Towards Smart Contract-Based Verification of Anonymous Credentials

    Smart contracts often need to verify identity-related information of their users. However, such information is typically confidential, and its...
    Robert Muth, Tarek Galal, ... Florian Tschorsch in Financial Cryptography and Data Security. FC 2022 International Workshops
    Conference paper 2023
  4. PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials

    We study the notion of anonymous credentials with Publicly Auditable Privacy Revocation (PAPR). PAPR credentials simultaneously provide conditional...
    Joakim Brorsson, Bernardo David, ... Paul Stankovski Wagner in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  5. A Framework for Practical Anonymous Credentials from Lattices

    We present a framework for building practical anonymous credential schemes based on the hardness of lattice problems. The running time of the prover...
    Jonathan Bootle, Vadim Lyubashevsky, ... Alessandro Sorniotti in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  6. Lattice Signature with Efficient Protocols, Application to Anonymous Credentials

    Digital signature is an essential primitive in cryptography, which can be used as the digital analogue of handwritten signatures but also as a...
    Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  7. EBSS: A secure blockchain-based sharing scheme for real estate financial credentials

    With the development of Internet finance, the real estate financial credentials have been extensively utilized in capital and trading markets. The...

    Yadi Wu, Guiyao Tie, ... Jun Song in World Wide Web
    Article 04 October 2022
  8. Selective Delegation of Attributes in Mercurial Signature Credentials

    Anonymous credential schemes enable service providers to verify information that a credential holder willingly discloses, without needing any further...
    Colin Putman, Keith M. Martin in Cryptography and Coding
    Conference paper 2024
  9. Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials

    Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models...

    Junli Fang, Tao Feng, ... Ye Lu in Journal of Cloud Computing
    Article Open access 02 February 2024
  10. Novel blockchain-based framework to publish, verify, and store digital academic credentials of universities

    Blockchain is the technology of choice to create cryptocurrency and bitcoins through the maintenance of immutable distributed ledgers in multiple...

    Tara Chandra, Mandeep Kaur, ... Sudhanshu Maurya in International Journal of Information Technology
    Article 06 May 2024
  11. Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes

    Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to authenticate while maintaining privacy. When instantiated from...
    Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  12. Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric

    Recent works to improve privacy in permissioned blockchains like Hyperledger Fabric rely on Idemix, the only anonymous credential system that has...
    Aisling Connolly, Jérôme Deschamps, ... Octavio Perez Kempner in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
  13. Cryptographic Credentials

    Living reference work entry 2023
  14. Traceable Constant-Size Multi-authority Credentials

    Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove the possession of some attributes, anonymously....
    Chloé Hébant, David Pointcheval in Security and Cryptography for Networks
    Conference paper 2022
  15. Anonymous Counting Tokens

    We introduce a new primitive called anonymous counting tokens (ACTs) which allows clients to obtain blind signatures or MACs (aka tokens) on messages...
    Fabrice Benhamouda, Mariana Raykova, Karn Seth in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  16. Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing

    During the pandemic, the limited functionality of existing privacy-preserving contact tracing systems highlights the need for new designs. Wang et...
    Pengfei Wang, **angyu Su, ... Keisuke Tanaka in Applied Cryptography and Network Security
    Conference paper 2024
  17. Unlinkable Delegation of WebAuthn Credentials

    The W3C’s WebAuthn standard employs digital signatures to offer phishing protection and unlinkability on the web using authenticators which manage...
    Nick Frymann, Daniel Gardham, Mark Manulis in Computer Security – ESORICS 2022
    Conference paper 2022
  18. Blockchain in E-Learning Platform to Enhance Trustworthy and Sharing of Micro-credentials

    Blockchain is a disruptive technology and interest in its adoption is growing across many market sectors in Industry 4.0. However, the blockchain...
    Alessandro Bigiotti, Maria Paola Francesca Bottoni, Giacomo Nalli in Advanced Information Systems Engineering Workshops
    Conference paper 2024
  19. Content addressable memory (CAM) based robust anonymous authentication and integrity preservation scheme for wireless body area networks (WBAN)

    Health plays a foremost role for every individual. To preserve the health, continuous monitoring of health is essential. Wireless Body Area Network...

    Arun Sekar Rajasekaran, M. Azees, ... Anand Nayyar in Multimedia Tools and Applications
    Article 01 August 2023
  20. AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

    The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and...

    Fatty M. Salem, Maha Safwat, ... Shahira Habashy in Journal of Cloud Computing
    Article Open access 30 August 2023
Did you find what you were looking for? Share feedback.