메뉴 건너뛰기




Volumn 24, Issue , 2004, Pages 608-615

Leak-free group signatures with immediate revocation

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; INTERFACES (COMPUTER); MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY SYSTEMS; THEOREM PROVING;

EID: 2442481842     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdcs.2004.1281628     Document Type: Conference Paper
Times cited : (19)

References (35)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO'2000, pages 255-270.
    • CRYPTO'2000 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 3
    • 0001451923 scopus 로고    scopus 로고
    • Some open issues and new directions in group signatures
    • G. Ateniese and G. Tsudik. Some open issues and new directions in group signatures. In Financial Crypto'99).
    • Financial Crypto'99
    • Ateniese, G.1    Tsudik, G.2
  • 4
    • 2642534257 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EuroCrypto'2003.
    • EuroCrypto'2003
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 5
    • 35048825135 scopus 로고
    • Receipt-free secret-ballot election (extended abstract)
    • J. Benaloh and D. Tuinstra. Receipt-free secret-ballot election (extended abstract). In STOC, 1994.
    • (1994) STOC
    • Benaloh, J.1    Tuinstra, D.2
  • 6
    • 85084163661 scopus 로고    scopus 로고
    • A method for fast revocation of public key certificates and security capabilities
    • D. Boneh, X. Ding, G. Tsudik, and C. Wong. A method for fast revocation of public key certificates and security capabilities. In 10th USENIX Security Symposium, 2001.
    • (2001) 10th USENIX Security Symposium
    • Boneh, D.1    Ding, X.2    Tsudik, G.3    Wong, C.4
  • 9
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO'2002, pages 61-76.
    • CRYPTO'2002 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EuroCrypto'2001, pages 93-118.
    • EuroCrypto'2001 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 84880895254 scopus 로고    scopus 로고
    • An identity escrow scheme with appointed verifiers
    • J. Camenisch and A. Lysyanskaya. An identity escrow scheme with appointed verifiers. In CRYPTO'2001, pages 388-407.
    • CRYPTO'2001 , pp. 388-407
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups (extended abstract)
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups (extended abstract). In CRYPTO'97, pages 410-424.
    • CRYPTO'97 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 14
    • 0038687775 scopus 로고    scopus 로고
    • Design and implementation of the idemix anonymous credential system
    • J. Camenisch and E. van Herreweghen. Design and implementation of the idemix anonymous credential system. In ACM CCS, 2002.
    • (2002) ACM CCS
    • Camenisch, J.1    Van Herreweghen, E.2
  • 16
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct.
    • D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10): 1030-1044, Oct. 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 17
    • 79251590715 scopus 로고    scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • D. Chaum and J. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In CRYPTO '86, pages 118-167.
    • CRYPTO '86 , pp. 118-167
    • Chaum, D.1    Evertse, J.2
  • 22
  • 23
    • 0022045868 scopus 로고
    • Impossibility of distributed commit with one faulty process
    • M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed commit with one faulty process. Journal of the ACM, 32(2), 1985.
    • (1985) Journal of the ACM , vol.32 , Issue.2
    • Fischer, M.1    Lynch, N.2    Paterson, M.3
  • 25
  • 27
    • 0023985465 scopus 로고    scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2), 1998.
    • SIAM Journal on Computing , vol.17 , Issue.2 , pp. 1998
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 28
    • 84948969982 scopus 로고    scopus 로고
    • Efficient receipt-free voting based on homomorphic encryption
    • M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In EuroCrypto'2000, pages 539-556.
    • EuroCrypto'2000 , pp. 539-556
    • Hirt, M.1    Sako, K.2
  • 31
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In STOC, 1990.
    • (1990) STOC
    • Naor, M.1    Yung, M.2
  • 32
    • 84974554584 scopus 로고    scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In CRYPTO'91, pages 433-444.
    • CRYPTO'91 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 33
    • 0035750987 scopus 로고    scopus 로고
    • Practical forward-secure group signature schemes
    • D. Song. Practical forward-secure group signature schemes. In ACM CCS, 2001.
    • (2001) ACM CCS
    • Song, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.