Anonymous credential schemes with encrypted attributes
From MaRDI portal
Publication:3058768
Recommendations
Cited in
(16)- Public Key Cryptography – PKC 2004
- Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
- Selective delegation of attributes in mercurial signature credentials
- scientific article; zbMATH DE number 2089751 (Why is no real title available?)
- scientific article; zbMATH DE number 2043307 (Why is no real title available?)
- scientific article; zbMATH DE number 1722673 (Why is no real title available?)
- Breaking and fixing anonymous credentials for the cloud
- An efficient self-blindable attribute-based credential scheme
- Issuer-hiding attribute-based credentials
- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials
- An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations
- Attribute-based anonymous credential: optimization for single-use and multi-use
- Anonymous credential system with efficient proofs for monotone formulas on attributes
- Block-wise P-signatures and non-interactive anonymous credentials with efficient attributes
- Composable and modular anonymous credentials: definitions and practical constructions
- Fully Anonymous Attribute Tokens from Lattices
This page was built for publication: Anonymous credential schemes with encrypted attributes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058768)