Divertible protocols and atomic proxy cryptography, EUROCRYPT '98. Volume 1403, pp.127-144, 1998. ,
DOI : 10.1007/BFb0054122
Homomorphic Signature Schemes, LNCS, vol.2271, pp.244-262, 2002. ,
DOI : 10.1007/3-540-45760-7_17
CRE- DENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing, In: Availability, Reliability and Trust ? SECPID@ARES, pp.2016-742, 2016. ,
Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2 .0 -Errata Composite, OASIS, 2009. ,
OpenID Connect Core 1.0, OpenID, 2014. ,
Nothing to hide: Why metadata should be presumed relevant, Kansas Law Review, Kansas Law Review Inc, vol.2, issue.562, 2008. ,
Metadata: Piecing together a privacy solution Available at SSRN:https://ssrn.com, 2008. ,
DOI : 10.2139/ssrn.2573962
The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.333-339, 2012. ,
DOI : 10.1109/PerComW.2012.6197506
Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998. ,
DOI : 10.1145/293347.293350
Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997. ,
DOI : 10.1109/SFCS.1997.646125
URL : http://www.math.umd.edu/~schmoyer/456/pir-1db.ps
Oblivious Transfer with Hidden Access Control Policies, LNCS, vol.6571, pp.192-209, 2011. ,
DOI : 10.1007/978-3-642-19379-8_12
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption, LNCS, vol.7485, pp.559-579, 2012. ,
DOI : 10.1007/978-3-642-32928-9_31
Software protection and simulation on oblivious RAMs, Journal of the ACM, vol.43, issue.3, pp.431-473, 1996. ,
DOI : 10.1145/233551.233553
URL : ftp://ftp.icsi.berkeley.edu/pub/techreports/1993/tr-93-072.ps.gz
Oblivious ram revisited Advances in Cryptology ? CRYPTO 2010: 30th Annual Cryptology Conference, Proceedings, pp.502-519, 2010. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981. ,
DOI : 10.1145/358549.358563
URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
URL : http://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002. ,
DOI : 10.1145/586110.586114
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, LNCS, vol.2045, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
URL : http://www.iacr.org/archive/eurocrypt2001/20450093.pdf
U-prove Cryptographic Specification v1, 2013. ,
Attribute-based credentials on encrypted attributes, 2016. ,
On Defining Proofs of Knowledge, LNCS, vol.740, pp.390-420, 1992. ,
DOI : 10.1007/3-540-48071-4_28