메뉴 건너뛰기




Volumn 3110, Issue , 2004, Pages 196-211

An efficient and usable multi-show non-transferable anonymous credential system

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL;

EID: 33744781066     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27809-2_21     Document Type: Article
Times cited : (37)

References (18)
  • 1
    • 0011255177 scopus 로고    scopus 로고
    • Internet X509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile
    • Network Working Group
    • Housley, R., Polk, W., Ford, W., Solo, D.: Internet X509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile. Network Working Group, RFC 3280 (2002)
    • (2002) RFC , vol.3280
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 5
    • 84957366640 scopus 로고    scopus 로고
    • Rapid Demonstration of Linear Relations Connected by Boolean Operators
    • Fumy, W., ed.: Advances in Cryptology - Eurocrypt '97. Springer-Verlag
    • Brands, S.: Rapid Demonstration of Linear Relations Connected by Boolean Operators. In Fumy, W., ed.: Advances in Cryptology - Eurocrypt '97. Volume 1223 of Lecture Notes in Computer Science., Springer-Verlag (1997) 318-333
    • (1997) Lecture Notes in Computer Science , vol.1223 , pp. 318-333
    • Brands, S.1
  • 6
    • 79251590715 scopus 로고
    • A Secure and Privacy-Protecting Protocol for Transmitting Personal Information between organizations
    • Advances in Cryptology - Crypto'86. Springer-Verlag
    • Chaum, D., Evertse, J.: A Secure and Privacy-Protecting Protocol for Transmitting Personal Information between organizations. In: Advances in Cryptology - Crypto'86. Volume 263 of Lecture Notes in Computer Science., Springer-Verlag (1987) 118-167
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.2
  • 7
    • 67651053584 scopus 로고    scopus 로고
    • Pseudonym Systems
    • Proceedings of Selected Areas in Cryptography. Springer-Verlag
    • Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym Systems. In: Proceedings of Selected Areas in Cryptography. Volume 1758 of Lecture Notes in Computer Science., Springer-Verlag (1999) 184-199
    • (1999) Lecture Notes in Computer Science , vol.1758 , pp. 184-199
    • Lysyanskaya, A.1    Rivest, R.2    Sahai, A.3    Wolf, S.4
  • 8
    • 84955571224 scopus 로고
    • Access with Pseudonyms
    • Cryptography: Policy and Algorithms. Springer-Verlag
    • Chen, L.: Access with Pseudonyms. In: Cryptography: Policy and Algorithms. Volume 1029 of Lecture Notes in Computer Science., Springer-Verlag (1995) 232-243
    • (1995) Lecture Notes in Computer Science , vol.1029 , pp. 232-243
    • Chen, L.1
  • 9
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient Non-Transferable Anonymous Multi-Show Credential System with Optional Anonymity Revocation
    • Advances in Cryptology - Eurocrypt '01. Springer-Verlag
    • Camenisch, J., Lysyanskaya, A.: An Efficient Non-Transferable Anonymous Multi-Show Credential System with Optional Anonymity Revocation. In: Advances in Cryptology - Eurocrypt '01. Volume 2656 of Lecture Notes in Computer Science., Springer-Verlag (2001) 93-118
    • (2001) Lecture Notes in Computer Science , vol.2656 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 84946849368 scopus 로고    scopus 로고
    • Self-Blindable Credential Certificates from the Weil Pairing
    • Boyd, C., ed.: Advances in Cryptology - Asiacrypt '01. Springer-Verlag
    • Verheul, E.: Self-Blindable Credential Certificates from the Weil Pairing. In Boyd, C., ed.: Advances in Cryptology - Asiacrypt '01. Volume 2248 of Lecture Notes in Computer Science., Springer-Verlag (2001) 533-551
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 533-551
    • Verheul, E.1
  • 11
    • 63449142665 scopus 로고    scopus 로고
    • An Anonymous Credential System and a Privacy-Aware PKI
    • Proceedings of the 8th Australasian Conference on Information Security and Privacy, (ACISP '03). Springer-Verlag
    • Persiano, P., Visconti, I.: An Anonymous Credential System and a Privacy-Aware PKI. In: Proceedings of the 8th Australasian Conference on Information Security and Privacy, (ACISP '03). Volume 2727 of Lecture Notes in Computer Science., Springer-Verlag (2003) 27-38
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 27-38
    • Persiano, P.1    Visconti, I.2
  • 12
    • 84921023488 scopus 로고    scopus 로고
    • Some Open Issues and New Directions in Group Signatures
    • Franklin, M., ed.: Financial Cryptography. Springer-Verlag
    • Ateniese, G., Tsudik, G.: Some Open Issues and New Directions in Group Signatures. In Franklin, M., ed.: Financial Cryptography. Volume 1648 of Lecture Notes in Computer Science., Springer-Verlag (1999) 196-211
    • (1999) Lecture Notes in Computer Science , vol.1648 , pp. 196-211
    • Ateniese, G.1    Tsudik, G.2
  • 13
    • 84958612917 scopus 로고    scopus 로고
    • Efficient Group Signature Schemes for Large Groups
    • Advances in Cryptology - Crypto 97 Springer-Verlag
    • Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Advances in Cryptology - Crypto 97. Volume 1294 of Lecture Notes in Computer Science., Springer-Verlag (1997) 410-424
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 14
    • 84921018856 scopus 로고    scopus 로고
    • A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
    • Advances in Cryptology - Crypto '00. Springer-Verlag
    • Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Advances in Cryptology - Crypto '00. Volume 1880 of Lecture Notes in Computer Science., Springer-Verlag (2000) 255-270
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 16
    • 0345490609 scopus 로고    scopus 로고
    • Efficient Group Signatures without Trapdoors
    • Advances in Cryptology - Asiacrypt '03. Springer-Verlag
    • Ateniese, G., De Medeiros, B.: Efficient Group Signatures without Trapdoors. In: Advances in Cryptology - Asiacrypt '03. Lecture Notes in Computer Science, Springer-Verlag (2003) 246-268
    • (2003) Lecture Notes in Computer Science , pp. 246-268
    • Ateniese, G.1    De Medeiros, B.2
  • 17
    • 84945309966 scopus 로고    scopus 로고
    • Proofs of Knowledge for Non-Monotone Discrete-Log Formulae and Applications
    • Proceedings of International Security Conference (ISC '02). Springer-Verlag
    • Bresson, E., Stern, J.: Proofs of Knowledge for Non-Monotone Discrete-Log Formulae and Applications. In: Proceedings of International Security Conference (ISC '02). Volume 2433 of Lecture Notes in Computer Science., Springer-Verlag (2002) 272-288
    • (2002) Lecture Notes in Computer Science , vol.2433 , pp. 272-288
    • Bresson, E.1    Stern, J.2
  • 18
    • 84957610863 scopus 로고    scopus 로고
    • Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes
    • Advances in Cryptology - Eurocrypt '99. Springer-Verlag
    • Camenisch, J., Michels, M.: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes. In: Advances in Cryptology - Eurocrypt '99. Volume 1592 of Lecture Notes in Computer Science., Springer-Verlag (1999) 106-121
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 106-121
    • Camenisch, J.1    Michels, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.