2006
DOI: 10.1007/11832072_8
|View full text |Cite
|
Sign up to set email alerts
|

Constant-Size Dynamic k-TAA

Abstract: Abstractk-times anonymous authentication (k-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times. Dynamic k-TAA allows application providers to independently grant or revoke users from their own access group so as to provide better control over their clients. In terms of time and space complexity, existing dynamic k-TAA schemes are of complexities O(k), where k is the allowed number of authentication. In this paper, we construct a dynamic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
132
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 180 publications
(155 citation statements)
references
References 20 publications
0
132
0
Order By: Relevance
“…It is described in [33] and has been proven secure under the n-SDH assumption [34,35]. It assumes a non-degenerate bilinear map e : G × G → G T of prime order q with generators h, h 0 , h 1 , .…”
Section: Signature Scheme With Efficient Protocolsmentioning
confidence: 99%
“…It is described in [33] and has been proven secure under the n-SDH assumption [34,35]. It assumes a non-degenerate bilinear map e : G × G → G T of prime order q with generators h, h 0 , h 1 , .…”
Section: Signature Scheme With Efficient Protocolsmentioning
confidence: 99%
“…Identity Mixer and U-Prove build on the CamenischLysyanskaya [24] and the Brands [11] signature schemes, respectively, but also other schemes exist [25,4]. An issued credential is a signature (or, for single-show schemes such as [11], a batch of renewable signatures) under such a scheme on the user's attributes.…”
Section: Cryptographic Realizationmentioning
confidence: 99%
“…The signature scheme originates from the same Boneh and Boyen signatures as the LN scheme, which is further modified by Camenisch et al [20] for the issuance of anonymous credentials and proven secure in [21] under the q-SDH assumption: σ = (g i…”
Section: Cks Schemementioning
confidence: 99%