Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs

J Camenisch, M Drijvers, J Hajny - Proceedings of the 2016 ACM on …, 2016 - dl.acm.org
We propose the first verifier-local revocation scheme for privacy-enhancing attribute-based
credentials (PABCs) that is practically usable in large-scale applications, such as national …

Delegatable functional signatures

M Backes, S Meiser, D Schröder - … Conference on Practice and Theory in …, 2016 - Springer
We introduce delegatable functional signatures (DFS) which support the delegation of
signing capabilities to another party, called the evaluator, with respect to a functionality F F …

AMA: Anonymous mutual authentication with traceability in carpooling systems

J Ni, K Zhang, X Lin, H Yang… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Carpooling, as an effective and eco-friendly travel mode, becomes a kind of public
spontaneous behavior with multiple travellers sharing a vehicle to reduce individuals' travel …

Building privacy-preserving cryptographic credentials from federated online identities

J Maheswaran, D Jackowitz, E Zhai… - Proceedings of the …, 2016 - dl.acm.org
Federated identity providers, eg, Facebook and PayPal, offer a convenient means for
authenticating users to third-party applications. Unfortunately such cross-site authentications …

Revocable privacy: Principles, use cases, and technologies

W Lueks, MH Everts, JH Hoepman - … October 7-8, 2015, Revised Selected …, 2016 - Springer
Security and privacy often seem to be at odds with one another. In this paper, we revisit the
design principle of revocable privacy which guides the creation of systems that offer …

Practical blacklist-based anonymous authentication scheme for mobile crowd sensing

H Li, K Jia, H Yang, D Liu, L Zhou - Peer-to-Peer Networking and …, 2016 - Springer
Mobile crowd sensing (MCS) represents one of the most promising approaches for
improving life quality of individuals with sensing and computing devices. MCS is playing a …

A framework for secure vehicular communication systems

AK Malhi - 2016 - shodhganga.inflibnet.ac.in
Vehicular ad-hoc networks have attracted comprehensive consideration in last few years for
their assurance in enhancing driving safety and revolutionizing the transportation systems …

[PDF][PDF] DELIVERABLE D2.

F Musiani, C Troncoso, H Halpin - 2016 - nextleap.eu
Decentralization is typically viewed as empowering to users and a cruicial component of one
possible future of the Internet, 1 yet there does not exist a foundational treatment of …

[PDF][PDF] Blacklisting User In Mobile Crowd Sensing

KP Dinkar, SA Jain - 2016 - academia.edu
An Anonymizing network provide anonymous access to their participants through hiding
their IP address. In anonymizing network users share their data with another network …

Flexible fair and collusion resistant pseudonym providing system

B Amro, A Levi, Y Saygin - 2016 - dspace.hebron.edu
In service providing systems, user authentication is required for different purposes such as
billing, restricting unauthorized access, etc., To protect the privacy of users, their real …