Login / Signup

Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.

Antoine Delignat-LavaudCédric FournetMarkulf KohlweissBryan Parno
Published in: IEEE Symposium on Security and Privacy (2016)
Keyphrases
  • access control
  • neural network
  • sufficient conditions
  • public key
  • information systems
  • database systems
  • multiscale