1. Lecture Notes in Computer Science;M.H. Au,2006
2. Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. Cryptology ePrint Archive: Report 2008/136 (2008);
3. This is the extended version of [1]
4. Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: Non-interactive anonymous credentials. Cryptology ePrint Archive: Report 2007/384 (2007)
5. Lecture Notes in Computer Science;M. Belenkiy,2008