메뉴 건너뛰기




Volumn 16, Issue 2, 2006, Pages 120-139

Anonymous attribute certificates based on traceable signatures

Author keywords

Internet; Privacy

Indexed keywords


EID: 33646356748     PISSN: 10662243     EISSN: None     Source Type: Journal    
DOI: 10.1108/10662240610656474     Document Type: Article
Times cited : (11)

References (14)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • Springer-Verlag New York, NY (Vol. 1880 of Lecture Notes in Computer Science).
    • Ateniense, G., Camenish, J., Joye, M. and Tsudik, G. (2000), “A practical and provably secure coalition-resistant group signature scheme”, CRYPTO 2000: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 255-70 (Vol. 1880 of Lecture Notes in Computer Science).
    • (2000) CRYPTO 2000: Advances in Cryptology , pp. 255-270
    • Ateniense, G.1    Camenish, J.2    Joye, M.3    Tsudik, G.4
  • 3
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Plenum Press Santa Barbara, CA
    • Chaum, D. (1983), “Blind signatures for untraceable payments”, in Ed. Chaum, D., Ed. Rivest, R. and Ed. Sherman, A. (Eds), Advances in Cryptology–Crypto'82, Plenum Press, Santa Barbara, CA, pp. 199-203.
    • (1983) Advances in Cryptology–Crypto'82 , pp. 199-203
    • Chaum, D.1    Chaum, D.2    Rivest, R.3    Sherman, A.4
  • 4
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • Chaum, D. (1985), “Security without identification: transaction systems to make big brother obsolete”, Communications of the ACM, Vol. 28 No. 10, pp. 1030-44.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 5
    • 85024290278 scopus 로고
    • Group signatures
    • Springer-Verlag Berlin (Volume 547 of Lecture Notes in Computer Science).
    • Chaum, D. and van Heyst, E. (1991), “Group signatures”, in Ed. Davies, D.W. (Ed.), Advances in Cryptology – EuroCrypt '91, Springer-Verlag, Berlin, pp. 257-65 (Volume 547 of Lecture Notes in Computer Science).
    • (1991) Advances in Cryptology – EuroCrypt '91 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2    Davies, D.W.3
  • 8
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • Springer-Verlag New York, NY (Vol. 3027 of Lecture Notes in Computer Science).
    • Kiayias, A., Tsiounis, Y. and Yung, M. (2004a), “Traceable signatures”, EUROCRYPT 2004: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 571-89 (Vol. 3027 of Lecture Notes in Computer Science).
    • (2004) EUROCRYPT 2004: Advances in Cryptology , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 9
    • 84957649548 scopus 로고    scopus 로고
    • Identity escrow
    • Springer-Verlag New York, NY (Vol. 1462 of Lecture Notes in Computer Science).
    • Kilian, J. and Petrank, E. (1998), “Identity escrow”, CRYPTO 1998: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 169-85 (Vol. 1462 of Lecture Notes in Computer Science).
    • (1998) CRYPTO 1998: Advances in Cryptology , pp. 169-185
    • Kilian, J.1    Petrank, E.2
  • 10
    • 35048876720 scopus 로고    scopus 로고
    • Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings
    • Springer-Verlag New York, NY (Vol. 3329 of Lecture Notes in Computer Science).
    • Nguyen, L. and Safavi-Naini, R. (2004), “Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings”, ASIACRYPT 2004: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 372-86 (Vol. 3329 of Lecture Notes in Computer Science).
    • (2004) ASIACRYPT 2004: Advances in Cryptology , pp. 372-386
    • Nguyen, L.1    Safavi-Naini, R.2
  • 11
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Springer-Verlag New York, NY (Vol. 2248 of Lecture Notes in Computer Science).
    • Rivest, R., Shamir, A. and Tauman, Y. (2001), “How to leak a secret”, ASIACRYPT 2001: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 552-65 (Vol. 2248 of Lecture Notes in Computer Science).
    • (2001) ASIACRYPT 2001: Advances in Cryptology , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3
  • 13
    • 50749133265 scopus 로고
    • On blind signatures and perfect crimes
    • von Solms, S. and Naccache, D. (1992), “On blind signatures and perfect crimes”, Computers & Security, Vol. 11, pp. 581-3.
    • (1992) Computers & Security , vol.11 , pp. 581-583
    • von Solms, S.1    Naccache, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.