anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002. ,
DOI : 10.1145/586110.586114
A Technical Overview of Digital Credentials, 2002. ,
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, Lecture Notes in Computer Science, vol.2442, pp.61-76, 2002. ,
DOI : 10.1007/3-540-45708-9_5
Accumulators from Bilinear Pairings and Applications, Lecture Notes in Computer Science, vol.3376, pp.275-292, 2005. ,
DOI : 10.1007/978-3-540-30574-3_19
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials, Lecture Notes in Computer Science, vol.5443, pp.481-500, 2009. ,
DOI : 10.1007/978-3-642-00468-1_27
Group signatures with verifier-local revocation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.168-177, 2004. ,
DOI : 10.1145/1030083.1030106
One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract), In: EUROCRYPT, pp.274-285, 1993. ,
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees, In: EUROCRYPT, pp.480-494, 1997. ,
DOI : 10.1007/3-540-69053-0_33
Authenticated hash tables, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.437-448, 2008. ,
DOI : 10.1145/1455770.1455826
Ensuring Authentication of Digital Information Using Cryptographic Accumulators, Lecture Notes in Computer Science, vol.5888, pp.315-333, 2009. ,
DOI : 10.1007/978-3-642-10433-6_21
Universal Accumulators with Efficient Nonmembership Proofs, Lecture Notes in Computer Science, vol.4521, pp.253-269, 2007. ,
DOI : 10.1007/978-3-540-72738-5_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.4339
Opoulos: Supporting Non-membership Proofs with Bilinear-map Accumulators, p.538, 2008. ,
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Lecture Notes in Computer Science, vol.2045, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
A Cryptographic Framework for the Controlled Release of Certified Data, Lecture Notes in Computer Science, vol.17, issue.2, pp.20-42, 2004. ,
DOI : 10.1007/3-540-45682-1_31
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, Lecture Notes in Computer Science, vol.1880, pp.255-270, 2000. ,
DOI : 10.1007/3-540-44598-6_16
A Signature Scheme with Efficient Protocols, Lecture Notes in Computer Science, vol.2576, pp.268-289, 2002. ,
DOI : 10.1007/3-540-36413-7_20
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings, Lecture Notes in Computer Science, vol.3329, pp.372-386, 2004. ,
DOI : 10.1007/978-3-540-30539-2_26
Signature Schemes and Anonymous Credentials from Bilinear Maps, pp.56-72 ,
DOI : 10.1007/978-3-540-28628-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.2381
Constant-Size Dynamic k-TAA, Lecture Notes in Computer Science, vol.4116, pp.111-125, 2006. ,
DOI : 10.1007/11832072_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2240
Efficient Group Signature Schemes for Large Groups (Extended Abstract), In: CRYPTO, pp.410-424, 1997. ,
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Lecture Notes in Computer Science, vol.263, pp.186-194, 1986. ,
DOI : 10.1007/3-540-47721-7_12
Security Analysis of the Strong Diffie-Hellman Problem, Lecture Notes in Computer Science, vol.4004, pp.1-11, 2006. ,
DOI : 10.1007/11761679_1
Advances in Cryptology -CRYPTO, 24th Annual International CryptologyConference Proceedings, 2004. ,