Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources
From MaRDI portal
Publication:2889864
DOI10.1007/978-3-642-28496-0_5zbMath1292.94137OpenAlexW2152581500MaRDI QIDQ2889864
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_5
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Oblivious Transfer with Hidden Access Control Policies
- Unclonable Group Identification
- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Fully homomorphic encryption using ideal lattices
- Advances in Cryptology – CRYPTO 2004
- Compact E-Cash
- Divisible E-Cash Systems Can Be Truly Anonymous
- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
- Applied Cryptography and Network Security