With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …

Anonymous attestation using the strong diffie hellman assumption revisited

J Camenisch, M Drijvers, A Lehmann - … August 29-30, 2016, Proceedings 9, 2016 - Springer
Abstract Direct Anonymous Attestation (DAA) is a cryptographic protocol for privacy-
protecting authentication. It is standardized in the TPM standard and implemented in millions …

Linked or unlinked: A systematic review of linkable ring signature schemes

J Odoom, X Huang, Z Zhou, S Danso, J Zheng… - Journal of Systems …, 2023 - Elsevier
As a prominent cryptographic primitive underlying anonymous communication, privacy-
preserving cryptocurrencies, and other blockchain-based applications, ring signatures have …

YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model

I Cascudo, B David, L Garms, A Konring - … on the Theory and Application of …, 2022 - Springer
Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult
due to the adversary's power to dynamically corrupt parties as the execution progresses …

Universally composable end-to-end secure messaging

R Canetti, P Jain, M Swanberg, M Varia - Annual International Cryptology …, 2022 - Springer
We model and analyze the Signal end-to-end messaging protocol within the UC framework.
In particular: We formulate an ideal functionality that captures end-to-end secure messaging …

One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation

J Camenisch, L Chen, M Drijvers… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
The Trusted Platform Module (TPM) is an international standard for a security chip that can
be used for the management of cryptographic keys and for remote attestation. The …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

How to bind anonymous credentials to humans

J Hesse, N Singh, A Sorniotti - 32nd USENIX Security Symposium …, 2023 - usenix.org
Digital and paper-based authentication are the two predominant mechanisms that have
been deployed in the real world to authenticate end-users. When verification of a digital …

Formal analysis and implementation of a tpm 2.0-based direct anonymous attestation scheme

S Wesemeyer, CJP Newton, H Treharne… - Proceedings of the 15th …, 2020 - dl.acm.org
Direct Anonymous Attestation (Daa) is a set of cryptographic schemes used to create
anonymous digital signatures. To provide additional assurance, Daa schemes can utilise a …

Hash-based direct anonymous attestation

L Chen, C Dong, N El Kassem, CJP Newton… - … Conference on Post …, 2023 - Springer
Abstract Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module
(TPM) and versions using RSA and elliptic curve cryptography have been included in the …