Author of the publication

SoK: Anonymous Credentials.

, , , and . SSR, volume 13895 of Lecture Notes in Computer Science, page 129-151. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks.. IWCC, volume 5557 of Lecture Notes in Computer Science, page 124-145. Springer, (2009)Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures., , and . Cryptogr. Commun., 3 (2): 65-86 (2011)Localised multisecret sharing., , , and . Cryptogr. Commun., 9 (5): 581-597 (2017)Broadcast-Enhanced Key Predistribution Schemes., , , , and . ACM Trans. Sens. Networks, 11 (1): 6:1-6:33 (2014)Perfect Secret Sharing Schemes on Five Participants., and . Des. Codes Cryptogr., 9 (3): 267-286 (1996)Providing Anonymity in Unconditionally Secure Secret Sharing Schemes., , and . Des. Codes Cryptogr., 28 (3): 227-245 (2003)Multisecret Threshold Schemes., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 126-135. Springer, (1993)Constructing Key Assignment Schemes from Chain Partitions., , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 130-145. Springer, (2010)A Combinatorial Model of Interference in Frequency Hopping Schemes., , and . CoRR, (2015)Localised Multisecret Sharing., , , and . IACR Cryptology ePrint Archive, (2015)