Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
Short group signatures
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …
the size of a standard RSA signature with the same security. Security of our group signature …
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
This paper provides theoretical foundations for the group signature primitive. We introduce
strong, formal definitions for the core requirements of anonymity and traceability. We then …
strong, formal definitions for the core requirements of anonymity and traceability. We then …
Foundations of group signatures: The case of dynamic groups
M Bellare, H Shi, C Zhang - Cryptographers' track at the RSA conference, 2005 - Springer
Recently, a first step toward establishing foundations for group signatures was taken [5], with
a treatment of the case where the group is static. However the bulk of existing practical …
a treatment of the case where the group is static. However the bulk of existing practical …
Threshold ring signatures and applications to ad-hoc groups
E Bresson, J Stern, M Szydlo - Annual International Cryptology Conference, 2002 - Springer
In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et
al. at Asiacrypt'01. We first improve on their ring signature paradigm by showing that it holds …
al. at Asiacrypt'01. We first improve on their ring signature paradigm by showing that it holds …
Anonymous Identification in Ad Hoc Groups
Abstract We introduce Ad hoc Anonymous Identification schemes, a new multi-user
cryptographic primitive that allows participants from a user population to form ad-hoc groups …
cryptographic primitive that allows participants from a user population to form ad-hoc groups …
Traceable signatures
This work presents a new privacy primitive called “Traceable Signatures”, together with an
efficient provably secure implementation. To this end, we develop the underlying …
efficient provably secure implementation. To this end, we develop the underlying …
Compact group signatures without random oracles
X Boyen, B Waters - Annual international conference on the theory and …, 2006 - Springer
We present the first efficient group signature scheme that is provably secure without random
oracles. We achieve this result by combining provably secure hierarchical signatures in …
oracles. We achieve this result by combining provably secure hierarchical signatures in …
ALARM: Anonymous location-aided routing in suspicious MANETs
K El Defrawy, G Tsudik - IEEE Transactions on Mobile …, 2010 - ieeexplore.ieee.org
In most common mobile ad hoc networking (MANET) scenarios, nodes establish
communication based on long-lasting public identities. However, in some hostile and …
communication based on long-lasting public identities. However, in some hostile and …
Quasi-efficient revocation of group signatures
Several interesting group signature schemes have been proposed to-date. However, in
order for the entire group signature concept to become practical and credible, the problem of …
order for the entire group signature concept to become practical and credible, the problem of …