Anonymous authenticated communication
From MaRDI portal
Publication:6134823
Recommendations
Cites work
- scientific article; zbMATH DE number 2081086 (Why is no real title available?)
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- scientific article; zbMATH DE number 2086702 (Why is no real title available?)
- Anonymous Signatures Made Easy
- Anonymous authentication with shared secrets
- Anonymous signatures revisited
- Anonymous symmetric-key communication
- Constructive cryptography -- a new paradigm for security definitions and proofs
- From Indifferentiability to Constructive Cryptography (and Back)
- Group Signatures
- Indistinguishability Amplification
- Overcoming impossibility results in composable security using interval-wise guarantees
- Public Key Cryptography - PKC 2006
- Robust Encryption
- Strong Anonymous Signatures
- Theory of Cryptography
Cited in
(8)- How to bootstrap anonymous communication
- Secure Pseudonymous Channels
- Unconditionally Secure Anonymous Encryption and Group Authentication
- PROPOSAL OF A SEMIFORMAL MODEL OF ANONYMOUS COMMUNICATION
- scientific article; zbMATH DE number 1979328 (Why is no real title available?)
- Anonymous authentication with shared secrets
- Anonymous symmetric-key communication
- Anonymous whistleblowing over authenticated channels
This page was built for publication: Anonymous authenticated communication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134823)