Conference paperAccumulators with Applications to Anonymity-Preserving RevocationFoteini Baldimtsi, Jan Camenisch, et al.EuroSys 2017
Conference paperHow to win the clonewars: Efficient periodic n-times anonymous authenticationJan Camenisch, Susan Hohenberger, et al.CCS 2006
Conference paperBounded-concurrent secure two-party computation without setup assumptionsYehuda LindellSTOC 2003
PaperMore Efficient Oblivious Transfer ExtensionsGilad Asharov, Yehuda Lindell, et al.Journal of Cryptology