With a little help from my friends: Constructing practical anonymous credentials
L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …
services, when simultaneously aiming for strong privacy guarantees of users combined with …
Anonymous attestation using the strong diffie hellman assumption revisited
Abstract Direct Anonymous Attestation (DAA) is a cryptographic protocol for privacy-
protecting authentication. It is standardized in the TPM standard and implemented in millions …
protecting authentication. It is standardized in the TPM standard and implemented in millions …
Linked or unlinked: A systematic review of linkable ring signature schemes
As a prominent cryptographic primitive underlying anonymous communication, privacy-
preserving cryptocurrencies, and other blockchain-based applications, ring signatures have …
preserving cryptocurrencies, and other blockchain-based applications, ring signatures have …
YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model
Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult
due to the adversary's power to dynamically corrupt parties as the execution progresses …
due to the adversary's power to dynamically corrupt parties as the execution progresses …
Universally composable end-to-end secure messaging
We model and analyze the Signal end-to-end messaging protocol within the UC framework.
In particular: We formulate an ideal functionality that captures end-to-end secure messaging …
In particular: We formulate an ideal functionality that captures end-to-end secure messaging …
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation
The Trusted Platform Module (TPM) is an international standard for a security chip that can
be used for the management of cryptographic keys and for remote attestation. The …
be used for the management of cryptographic keys and for remote attestation. The …
Critical perspectives on provable security: Fifteen years of" another look" papers
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
How to bind anonymous credentials to humans
J Hesse, N Singh, A Sorniotti - 32nd USENIX Security Symposium …, 2023 - usenix.org
Digital and paper-based authentication are the two predominant mechanisms that have
been deployed in the real world to authenticate end-users. When verification of a digital …
been deployed in the real world to authenticate end-users. When verification of a digital …
Formal analysis and implementation of a tpm 2.0-based direct anonymous attestation scheme
Direct Anonymous Attestation (Daa) is a set of cryptographic schemes used to create
anonymous digital signatures. To provide additional assurance, Daa schemes can utilise a …
anonymous digital signatures. To provide additional assurance, Daa schemes can utilise a …
Hash-based direct anonymous attestation
Abstract Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module
(TPM) and versions using RSA and elliptic curve cryptography have been included in the …
(TPM) and versions using RSA and elliptic curve cryptography have been included in the …