How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Group Signature Scheme Committing the Group
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Hi-index | 0.00 |
A distributor of digital contents desires to collect users' attributes. This is because the distributor can grasp the image of users, and work out the marketing strategy. On the other hand, the users do not desire to offer the attributes owing to the privacy protection. For anonymous surveys, a protocol to generate statistical results of the attributes is previously proposed, where the extra information is not released beyond the statistical results. However, in the simple application of this protocol to the surveys, the correctness of the statistical results is not assured, since the users do not necessarily offer the correct attributes. In this paper, under the assumption that some trusted third parties exist, an anonymous statistical survey system of attributes witht he correctness is proposed.