Mix-Network with Stronger Security, In: Privacy Enhancing Technologies, vol.22, issue.11, pp.128-146, 2005. ,
DOI : 10.1007/978-3-540-24638-1_18
The Wisdom of Crowds: Attacks and Optimal Constructions, In: ESORICS, vol.7, issue.4, pp.406-423, 2009. ,
DOI : 10.1145/1042031.1042032
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, CRYPTO '91: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pp.129-140, 1992. ,
DOI : 10.1007/3-540-46766-1_9
Statistical Secrecy and Multi-Bit Commitments, BRICS Report Series, vol.3, issue.45, 1996. ,
DOI : 10.7146/brics.v3i45.20047
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, CRYPTO '98: Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology, pp.13-25, 1998. ,
DOI : 10.1007/BFb0055717
Towards a framework for handling disputes in payment systems, 1998. ,
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000. ,
An identifiability-based access control model for privacy protection in open systems, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, pp.43-43, 2004. ,
DOI : 10.1145/1029179.1029194