A controllable and trusted anonymous communication scheme

ZQ Wu, YW Zhou, ZR Qiao - Jisuanji Xuebao(Chinese Journal of …, 2010 - cjc.ict.ac.cn
Encryption technology can only carry on the protection to the correspondence data content,
but in some special application fields, such as e-voting, e-health, e-commerce and e-cash …

Secure anonymous communication with conditional traceability

Z Ma, X Zhao, G Zhi, G Ming, J Sun - Network and Parallel Computing: IFIP …, 2005 - Springer
A new anonymous secure communication protocol with conditional traceability is proposed
to provide personal anonymity and privacy protection, in which a secure mapping function is …

Aitac: an identity-based traceable anonymous communication model

F Li, Z Liu, Y Wang, N Wu, J Yu, C Gao… - Journal of Ambient …, 2022 - Springer
In the big data background, data privacy becomes more and more important when data
leakage and other security events occur more frequently. As one of the key means of privacy …

A direct anonymous attestation scheme in multi-domain environment

X Chen, D Feng - Chinese Journal of Computers, 2008 - cjc.ict.ac.cn
In this paper, the authors analyze the direct anonymous scheme for trusted computing
platform and find the deficiency of direct anonymous scheme in multi-domain environments …

Anonymous Communication via Anonymous Identity‐Based Encryption and Its Application in IoT

L Jiang, T Li, X Li, M Atiquzzaman… - Wireless …, 2018 - Wiley Online Library
Under the environment of the big data, the correlation between the data makes people have
a greater demand for privacy. Moreover, the world has become more diversified and …

Improved direct anonymous attestation scheme

S Cheng, XUN Yu-Qiong, P Wei-Beng… - Journal of Beijing …, 2011 - journal.bupt.edu.cn
For solving the questions of complexities, high computation consumings and applications
limited for the direct anonymous attestation (DAA), a new DAA scheme is proposed based …

[PDF][PDF] Anonymous Communication

I Liaqat, M Raheem - Linkoping University, Dept. of Computer and …, 2007 - academia.edu
This report contains different methods used to provide anonymity in order to provide secrecy.
It describes the two broad techniques to achieve Anonymity (Mixes and DC-Nets). The main …

Secure and anonymous communication technique: Formal model and its prototype implementation

K Emura, A Kanaoka, S Ohta, K Omote… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Both anonymity and end-to-end encryption are recognized as important properties in privacy-
preserving communication. However, secure and anonymous communication protocol that …

[PDF][PDF] An efficient direct anonymous attestation scheme with forward security

DG Feng, J Xu, XF Chen - WSEAS Transactions on Communications, 2009 - Citeseer
Direct Anonymous Attestation (DAA) is a cryptographic mechanism adopted by the Trusted
Computing Group in its specifications for trusted computing platforms (TCP). In this paper …

A direct anonymous attestation scheme for embedded devices

H Ge, SR Tate - Public Key Cryptography–PKC 2007: 10th International …, 2007 - Springer
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the
Trusted Computing Group in its specifications for trusted computing platforms. This paper …