2005
DOI: 10.1007/11496137_22
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic k-Times Anonymous Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
79
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(79 citation statements)
references
References 11 publications
0
79
0
Order By: Relevance
“…As previously explained in [7,11], most related schemes (e.g., e-cash, digital credentials) cannot be employed as privacy-protecting unsplittable MCS s because they have different usage patterns [15,1], are inefficient in this setup [12], or lack at least one of the required properties [3], in particular unsplittability. Some e-cash systems can be used as unlinkable or at least anonymous MCS s (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…As previously explained in [7,11], most related schemes (e.g., e-cash, digital credentials) cannot be employed as privacy-protecting unsplittable MCS s because they have different usage patterns [15,1], are inefficient in this setup [12], or lack at least one of the required properties [3], in particular unsplittability. Some e-cash systems can be used as unlinkable or at least anonymous MCS s (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…In the schemes of [TFS04,NN05], a user prove this using the 'OR proof', that is, a user proves that one of τ = r 1 x , τ = r 2 x , . .…”
Section: Key Ideasmentioning
confidence: 99%
“…We note that Nguyen and Naini [NN05] also adopt the definition which allows an AP to publish its own public information, but they do not adopt the other two modifications.…”
Section: Modified Pointsmentioning
confidence: 99%
See 2 more Smart Citations