메뉴 건너뛰기




Volumn , Issue , 2004, Pages 158-167

κ-anonymous secret handshakes with reusable credentials

Author keywords

Anonymity, unlinkability; Credential systems; Privacy preserving authentication; Reusable credentials; Secret handshake

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; ONLINE SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 14844289583     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030105     Document Type: Conference Paper
Times cited : (97)

References (31)
  • 4
    • 84946837370 scopus 로고    scopus 로고
    • Key-privacy in public-key encryption
    • C. Boyd, editor. Springer-Verlag. Lecture Notes in Computer Science No. 2248
    • M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In C. Boyd, editor, Advances in Cryptology-ASIACRYPT '2001, pages 566-582. Springer-Verlag, 2001. Lecture Notes in Computer Science No. 2248.
    • (2001) Advances in Cryptology-ASIACRYPT '2001 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 5
    • 84948986458 scopus 로고    scopus 로고
    • Optimal asymmetric encryption
    • A. D. Santis, editor. Springer, 1995. Lecture Notes in Computer Science No. 950
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. D. Santis, editor, EUROCRYPT94, pages 92-111. Springer, 1995. Lecture Notes in Computer Science No. 950.
    • EUROCRYPT94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • T. Beth, N. Cot, and I. Ingemarsson, editors. Springer-Verlag. Lecture Notes in Computer Science No. 209
    • R. Blom. An optimal class of symmetric key generation systems. In T. Beth, N. Cot, and I. Ingemarsson, editors, Proc. EUROCRYPT 84, pages 335-338. Springer-Verlag, 1985. Lecture Notes in Computer Science No. 209.
    • (1985) Proc. EUROCRYPT 84 , pp. 335-338
    • Blom, R.1
  • 7
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • E. P. Brickell, editor. Springer-Verlag. Lecture Notes in Computer Science No. 740
    • C. Blundo, A. DeSantis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In E. P. Brickell, editor, Proc. CRYPTO 92, pages 471-486. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740.
    • (1992) Proc. CRYPTO 92 , pp. 471-486
    • Blundo, C.1    Desantis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 9
    • 35048855095 scopus 로고    scopus 로고
    • Secret handshakes from ca-oblivious encryption
    • P. Lee, editor, Advances in Cryptology - ASIACRYPT 2004 Springer
    • C. Castelluccia, S. Jarecki, and G. Tsudik. Secret handshakes from ca-oblivious encryption. In P. Lee, editor, Advances in Cryptology - ASIACRYPT 2004, volume of Lecture Notes in Computer Science, pages Springer, 2004.
    • (2004) Lecture Notes in Computer Science
    • Castelluccia, C.1    Jarecki, S.2    Tsudik, G.3
  • 10
    • 0020915882 scopus 로고    scopus 로고
    • Blind signatures for untraceable payments
    • R. L. Rivest, A. Sherman, and D. Chaum, editors, New York, 1983. Plenum Press
    • D. Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 88, pages 199-203, New York, 1983. Plenum Press.
    • Proc. CRYPTO 88 , pp. 199-203
    • Chaum, D.1
  • 11
    • 85024290278 scopus 로고
    • Group signatures
    • D. W. Davies, editor, Berlin. Springer-Verlag. Lecture Notes in Computer Science No. 547
    • D. Chaum and E. V. Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - Eurocrypt '91, pages 257-265, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science No. 547.
    • (1991) Advances in Cryptology - Eurocrypt '91 , pp. 257-265
    • Chaum, D.1    Heyst, E.V.2
  • 12
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Y. G. Desmedt, editor. Springer. Lecture Notes in Computer Science No. 839
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, Proc. CRYPTO 94, pages 174-187. Springer, 1994. Lecture Notes in Computer Science No. 839.
    • (1994) Proc. CRYPTO 94 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 13
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • H. Krawczyk, editor. Springer-Verlag. Lecture Notes in Computer Science No. 1462
    • R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Proc. CRYPTO 98, pages 13-25. Springer-Verlag, 1998. Lecture Notes in Computer Science No. 1462.
    • (1998) Proc. CRYPTO 98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 16
    • 84880853825 scopus 로고    scopus 로고
    • Rsa-oaep is secure under the rsa assumption
    • J. Kilian, editor, Proc. CRYPTO 2001. Springer-Verlag
    • E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. Rsa-oaep is secure under the rsa assumption. In J. Kilian, editor, Proc. CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 260-274. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 260-274
    • Fujisaki, E.1    Okamoto, T.2    Pointcheval, D.3    Stern, J.4
  • 18
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Apr.
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, Apr. 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 22
    • 35248816546 scopus 로고    scopus 로고
    • Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols
    • D. Boneh, editor, Proc. CRYPTO 2003. Springer-Verlag
    • H. Krawczyk. Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols. In D. Boneh, editor, Proc. CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 400-425. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2729 , pp. 400-425
    • Krawczyk, H.1
  • 24
    • 79960836060 scopus 로고    scopus 로고
    • Deniable ring authentication
    • M. Yung, editor, Proc. CRYPTO 2002. Springer-Verlag
    • M. Naor. Deniable ring authentication. In M. Yung, editor, Proc. CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 481-498. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 481-498
    • Naor, M.1
  • 25
    • 0034449509 scopus 로고    scopus 로고
    • User privacy issues regarding certificates and the tls protocol: The design and implementation of the spsl protocol
    • ACM
    • P. Persiano and I. Visconti. User privacy issues regarding certificates and the tls protocol: the design and implementation of the spsl protocol. In ACM Conference on Computer and Communications Security, pages 53-62. ACM, 2000.
    • (2000) ACM Conference on Computer and Communications Security , pp. 53-62
    • Persiano, P.1    Visconti, I.2
  • 26
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • J. Feigenbaum, editor. Springer. Lecture Notes in Computer Science No. 576
    • C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In J. Feigenbaum, editor, Proc. CRYPTO 91, pages 433-444. Springer, 1992. Lecture Notes in Computer Science No. 576.
    • (1992) Proc. CRYPTO 91 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 30
    • 14844282596 scopus 로고    scopus 로고
    • K-anonymous message transmission
    • V. Atluri, editor, Washington D.C., USA, October. ACM, ACM Press
    • L. von Ahn, A. Bortz, and N. Hopper, k-anonymous message transmission. In V. Atluri, editor, Proc. of ACM-CCS 03, pages 122-130, Washington D.C., USA, October 2003. ACM, ACM Press.
    • (2003) Proc. of ACM-CCS 03 , pp. 122-130
    • Von Ahn, L.1    Bortz, A.2    Hopper, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.