4.7 Article

Direct Anonymous Attestation With Optimal TPM Signing Efficiency

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Updating Key Size Estimations for Pairings

Razvan Barbulescu et al.

JOURNAL OF CRYPTOLOGY (2019)

Proceedings Paper Computer Science, Information Systems

Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain

Jan Camenisch et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Software Engineering

Anonymous Attestation with Subverted TPMs

Jan Camenisch et al.

ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III (2017)

Proceedings Paper Computer Science, Information Systems

One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation

Jan Camenisch et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Information Systems

Anonymous Attestations Made Practical

Amira Barki et al.

PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Short Structure-Preserving Signatures

Essam Ghadafi

TOPICS IN CRYPTOLOGY - CT-RSA 2016 (2016)

Proceedings Paper Computer Science, Information Systems

DAA-A: Direct Anonymous Attestation with Attributes

Liqun Chen et al.

TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015 (2015)

Article Computer Science, Information Systems

Anonymous attestation with user-controlled linkability

D. Bernhard et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2013)

Article Computer Science, Theory & Methods

Short signatures without random oracles and the SDH assumption in bilinear groups

Dan Boneh et al.

JOURNAL OF CRYPTOLOGY (2008)

Article Computer Science, Theory & Methods

Security arguments for digital signatures and blind signatures

D Pointcheval et al.

JOURNAL OF CRYPTOLOGY (2000)