The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The schemes aim to provide a strong cryptographic evidence of integrity of the signed data and origin of the signature, but at the same time have to hide the identity of the signatory. There are two crucial properties that are specific for pseudonymous signatures: ability to recover the real identity of the signatory in certain circumstances and resilience to Sybil attacks. Despite using a single private key, the signatory can create a (single) unlinkable pseudonym for each domain or sector of activity and generate signatures corresponding to this pseudonym
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Digital signature is one of the most important primitives in public key cryptography. It provides au...
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for privat...
We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [10]...
Nowadays, people are looking for the easiest way to do things. The digital world has made that even ...
We introduce the notion of tamper-evidence for digital signature generation in order to defend again...
Cryptography is the practice and study of hiding information. In modern times, cryptography is consi...
Cryptography is the practice and study of hiding information. In modern times, cryptography is consi...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
Abstract. This paper tackles the following problem: how to decide whether data are trustworthy when ...
In traditional public key cryptography, public keys of users are essentially random strings generate...
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms ...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Digital signature is one of the most important primitives in public key cryptography. It provides au...
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for privat...
We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [10]...
Nowadays, people are looking for the easiest way to do things. The digital world has made that even ...
We introduce the notion of tamper-evidence for digital signature generation in order to defend again...
Cryptography is the practice and study of hiding information. In modern times, cryptography is consi...
Cryptography is the practice and study of hiding information. In modern times, cryptography is consi...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
Abstract. This paper tackles the following problem: how to decide whether data are trustworthy when ...
In traditional public key cryptography, public keys of users are essentially random strings generate...
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms ...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...