Concurrent Security of Anonymous Credentials Light, Revisited.
Julia KastnerJulian LossOmar RenawiPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- access control
- trust negotiation
- digital signature scheme
- security policies
- security requirements
- information security
- security systems
- security mechanisms
- security problems
- intrusion detection
- security analysis
- security issues
- access control policies
- functional requirements
- cryptographic protocols
- user privacy
- network security
- trusted platform module
- data privacy
- key management
- encryption scheme
- security protocols
- cyber security
- data security
- security level
- critical information
- smart card