Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Short group signatures

D Boneh, X Boyen, H Shacham - Annual international cryptology …, 2004 - Springer
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …

Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions

M Bellare, D Micciancio, B Warinschi - … on the Theory and Applications of …, 2003 - Springer
This paper provides theoretical foundations for the group signature primitive. We introduce
strong, formal definitions for the core requirements of anonymity and traceability. We then …

Foundations of group signatures: The case of dynamic groups

M Bellare, H Shi, C Zhang - Cryptographers' track at the RSA conference, 2005 - Springer
Recently, a first step toward establishing foundations for group signatures was taken [5], with
a treatment of the case where the group is static. However the bulk of existing practical …

Threshold ring signatures and applications to ad-hoc groups

E Bresson, J Stern, M Szydlo - Annual International Cryptology Conference, 2002 - Springer
In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et
al. at Asiacrypt'01. We first improve on their ring signature paradigm by showing that it holds …

Anonymous Identification in Ad Hoc Groups

Y Dodis, A Kiayias, A Nicolosi, V Shoup - … , May 2-6, 2004. Proceedings 23, 2004 - Springer
Abstract We introduce Ad hoc Anonymous Identification schemes, a new multi-user
cryptographic primitive that allows participants from a user population to form ad-hoc groups …

Traceable signatures

A Kiayias, Y Tsiounis, M Yung - … on the Theory and Applications of …, 2004 - Springer
This work presents a new privacy primitive called “Traceable Signatures”, together with an
efficient provably secure implementation. To this end, we develop the underlying …

Compact group signatures without random oracles

X Boyen, B Waters - Annual international conference on the theory and …, 2006 - Springer
We present the first efficient group signature scheme that is provably secure without random
oracles. We achieve this result by combining provably secure hierarchical signatures in …

ALARM: Anonymous location-aided routing in suspicious MANETs

K El Defrawy, G Tsudik - IEEE Transactions on Mobile …, 2010 - ieeexplore.ieee.org
In most common mobile ad hoc networking (MANET) scenarios, nodes establish
communication based on long-lasting public identities. However, in some hostile and …

Quasi-efficient revocation of group signatures

G Ateniese, D Song, G Tsudik - … , Bermuda, March 2002 Revised Papers 6, 2003 - Springer
Several interesting group signature schemes have been proposed to-date. However, in
order for the entire group signature concept to become practical and credible, the problem of …