Back to Results
First PageMeta Content
Cryptography / Computer security / Identity management / Computational complexity theory / Proof of knowledge / Zero-knowledge proof / Credential / Message authentication code / NP / IP / Authentication


This is the full version of an extended abstract published in ACM CCSPosted as Reporton 19 August 2013; revised 8 SeptemberAlgebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase
Add to Reading List

Document Date: 2018-10-23 14:58:02


Open Document

File Size: 513,02 KB

Share Result on Facebook