On anonymity with identity escrow
A Mukhamedov, MD Ryan - International Workshop on Formal Aspects in …, 2005 - Springer
… Our improved protocol guarantees anonymity even if all but one of the escrow holders are …
the escrowed certificate is valid and that the identity is recoverable (with a help of escrow agent…
the escrowed certificate is valid and that the identity is recoverable (with a help of escrow agent…
Identity escrow
J Kilian, E Petrank - Annual International Cryptology Conference, 1998 - Springer
… signatures has an escrow-like feature in which the anonymity of a … of key escrow ideas:
authentication and identity schemes. … of an escrowed identity scheme based on the E1Gamal …
authentication and identity schemes. … of an escrowed identity scheme based on the E1Gamal …
Identity escrow protocol and anonymity analysis in the applied pi-calculus
A Mukhamedov, MD Ryan - … Transactions on Information and System …, 2010 - dl.acm.org
… , while providing the possibility that the service owner can break the anonymity in exceptional
… an identity escrow protocol that distributes user identity among several escrow agents. The …
… an identity escrow protocol that distributes user identity among several escrow agents. The …
Anonymity and privacy in bitcoin escrow trades
… of their users trades and identities. It also shows how tracking down criminals activities …
The privacy and anonymity research of trading over escrow done in this paper, relied only on …
The privacy and anonymity research of trading over escrow done in this paper, relied only on …
New identity escrow scheme for anonymity authentication
YH Lee, IY Lee, HW Lee - International Conference on Cryptology in India, 2002 - Springer
… scheme, the issuer who has accurate user identity safely transmits anonymous … while keeping
anonymity. In this thesis, requirements for security and trusty of the identity escrow scheme …
anonymity. In this thesis, requirements for security and trusty of the identity escrow scheme …
Anonymity for bitcoin from secure escrow address
… ’s identity, all past and future transactions related to the linked address can be traced,
compromising the user’s anonymity. … We focus on the most prevalent approach to strengthen …
compromising the user’s anonymity. … We focus on the most prevalent approach to strengthen …
Removing escrow from identity-based encryption: New security notions and key management techniques
SSM Chow - International workshop on public key cryptography, 2009 - Springer
… protocol, which is based on the standard argument in anonymous credential literature [5,16].
The first step of our AKI protocol is to get a certificate on an identity from the ICA, which just …
The first step of our AKI protocol is to get a certificate on an identity from the ICA, which just …
An identity escrow scheme with appointed verifiers
J Camenisch, A Lysyanskaya - Annual International Cryptology …, 2001 - Springer
… They allow a member of some group to sign anonymously on the … of identity escrow [32]
schemes. They can be seen as group-member identification schemes with revocable anonymity. …
schemes. They can be seen as group-member identification schemes with revocable anonymity. …
DECIDE: a scheme for decentralized identity escrow
N Taniguchi, K Chida, O Shionoiri, A Kanai - … workshop on Digital identity …, 2005 - dl.acm.org
… identity escrow scheme called DECIDE. It has three identity tiers: anonymity, pseudonymity,
and identity, and it … We also present an analysis on three service models - online discussion …
and identity, and it … We also present an analysis on three service models - online discussion …
How to solve key escrow and identity revocation in identity-based encryption schemes
JH Oh, KK Lee, SJ Moon - … Conference on Information Systems Security, 2005 - Springer
… In this paper, to solve both key escrow and identity revocation, we propose a mediated
identity-based encryption scheme that does not suffer from inherent key escrow. Our proposed …
identity-based encryption scheme that does not suffer from inherent key escrow. Our proposed …