1. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
2. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
3. [3] T. Kato, K. Okada, and T. Yoshida, “Development of anonymous authentication system for personal data protection, ” Proc. Computer Security Symposium 2003 (CSS2003), IPSJ Symposium Series, vol.2003, no.15, pp.569-574, 2003.
4. [4] S. Kiyomoto and T. Tanaka, “Anonymous attribute authentication scheme using self-blindable certificates, ” Proc. IEEE International Conference on Intelligence and Security Informatics (ISI) 2008, pp.215-217, 2008.
5. Efficient Dynamic k-Times Anonymous Authentication