Improved algebraic MACs and practical keyed-verification anonymous credentials
From MaRDI portal
Publication:1698653
DOI10.1007/978-3-319-69453-5_20zbMATH Open1418.94030OpenAlexW2766459481MaRDI QIDQ1698653FDOQ1698653
Jacques Traoré, S. Brunet, Amira Barki, Nicolas Desmoulins
Publication date: 16 February 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-69453-5_20
Recommendations
- Non-interactive keyed-verification anonymous credentials
- Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials
- scientific article; zbMATH DE number 1722673
- An Efficient Anonymous Credential System
- Information Security and Privacy
attributesanonymous credentialsJava card SIM cardmessage authentication codes (MACs)multi-show unlinkability
Cites Work
- Title not available (Why is that?)
- Efficient signature generation by smart cards
- Efficient concurrent zero-knowledge in the auxiliary string model
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Composable and Modular Anonymous Credentials: Definitions and Practical Constructions
- Practical Round-Optimal Blind Signatures in the Standard Model
- An Efficient Anonymous Credential System
Cited In (9)
- E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels
- An Efficient Self-blindable Attribute-Based Credential Scheme
- Title not available (Why is that?)
- Another Look at Security Theorems for 1-Key Nested MACs
- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
- Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup
- Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model
- Scored anonymous credentials
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system
Uses Software
This page was built for publication: Improved algebraic MACs and practical keyed-verification anonymous credentials
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1698653)