메뉴 건너뛰기




Volumn 3895 LNCS, Issue , 2006, Pages 164-186

How to leak a secret: Theory and applications of ring signatures

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; HIDDEN MARKOV MODELS; INTRUSION DETECTION; NETWORK SECURITY;

EID: 33746205204     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11685654_7     Document Type: Article
Times cited : (79)

References (45)
  • 1
    • 26444521603 scopus 로고    scopus 로고
    • ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. In Cryptology ePrint Archive
    • Report 2004/184
    • Amit K. Awasthi and Sunder Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. In Cryptology ePrint Archive: Report 2004/184.
    • Awasthi, A.K.1    Lal, S.2
  • 2
    • 35048873387 scopus 로고    scopus 로고
    • Identity-Based Chameleon Hash and Applications
    • G. Ateniese and B. de Medeiros. Identity-Based Chameleon Hash and Applications. In Financial Cryptography 2004, pages 164-180.
    • (2004) Financial Cryptography , pp. 164-180
    • Ateniese, G.1    de Medeiros, B.2
  • 3
    • 84958744427 scopus 로고    scopus 로고
    • Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In ASIACRYPT 2002, LNCS 2501, pages 415-432.
    • Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In ASIACRYPT 2002, LNCS 2501, pages 415-432.
  • 4
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and Verfiably Encrypted Signatures from Bilinear Maps
    • E. Biham, ed, Proceedings of Eurocrypt of
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verfiably Encrypted Signatures from Bilinear Maps. In E. Biham, ed., Proceedings of Eurocrypt 2003, vol. 2656 of LNCS, pages 416-432.
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 6
    • 84937420077 scopus 로고    scopus 로고
    • Threshold Ring Signatures and Applications to Ad-Hoc Groups (Extended abstract)
    • Advances in Cryptology, Proceedings of CRYPTO '02
    • Emmanuel Bresson, Jacque Stern, and Michael Szydlo. Threshold Ring Signatures and Applications to Ad-Hoc Groups (Extended abstract). In Advances in Cryptology - Proceedings of CRYPTO '02, LNCS 2442, pages 465-480.
    • LNCS , vol.2442 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 7
    • 84941182204 scopus 로고    scopus 로고
    • Efficient and Generalzied Group Sigmatures
    • Jan Camenisch. Efficient and Generalzied Group Sigmatures. In Advances in Cryptology - Eurocrypt 97, pages 465-479.
    • Advances in Cryptology - Eurocrypt , vol.97 , pp. 465-479
    • Camenisch, J.1
  • 8
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms
    • David Chaum. Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. In Communications of the ACM 24(2), pages 84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 9
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
    • David Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. In Journal of Cryptology 1 (1), pages 65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 10
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Yvo Desmedt, editor, Advances in Cryptology, CRYPTO '94, Berlin, Springer-Verlag
    • Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, pages 174-187, Berlin, 1994. Springer-Verlag. Lecture Notes in Computer Science Volume 839.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 11
    • 84941178131 scopus 로고    scopus 로고
    • Sherman S.M. Chow, Lucas C.K.Hui, and S.M.Yiu. Identity Based Threshold Ring Signature. In Cryptology ePrint Archive: Report 2004/179.
    • Sherman S.M. Chow, Lucas C.K.Hui, and S.M.Yiu. Identity Based Threshold Ring Signature. In Cryptology ePrint Archive: Report 2004/179.
  • 12
    • 85024290278 scopus 로고
    • Group signatures
    • D.W. Davies, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science
    • David Chaum and Eugene Van Heyst. Group signatures. In D.W. Davies, editor, Advances in Cryptology -Eurocrypt '91, pages 257-265, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science No. 547.
    • (1991) Advances in Cryptology -Eurocrypt '91 , Issue.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 14
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 15
  • 17
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for Anonymous and Private Internet Connections
    • David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Onion Routing for Anonymous and Private Internet Connections. In Communications of the ACM 42(2), pages 39-41, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 18
    • 33749987363 scopus 로고    scopus 로고
    • Formal Proof of Security of Zhang and Kim's ID-Based Ring Signature Scheme
    • Javier Herranz. A Formal Proof of Security of Zhang and Kim's ID-Based Ring Signature Scheme. In WOSIS 2004, pages 63-72.
    • WOSIS 2004 , pp. 63-72
    • Javier Herranz, A.1
  • 19
    • 84941170192 scopus 로고    scopus 로고
    • Y. Hanatani and K. Ohta. Two Stories of Ring Signatures. Crypto 2005 rump session talk. Available at http://www.iacr.org/conferences/crypto2005/r/38.ppt. A photo of the 1756 ring signature is available at http://www.nihonkoenmura.jp/theme3/takarabito07.htm.
    • Y. Hanatani and K. Ohta. Two Stories of Ring Signatures. Crypto 2005 rump session talk. Available at http://www.iacr.org/conferences/crypto2005/r/38.ppt. A photo of the 1756 "ring signature" is available at http://www.nihonkoenmura.jp/theme3/takarabito07.htm.
  • 21
    • 85088187688 scopus 로고    scopus 로고
    • Ring Signature Schemes for General Ad-Hoc Access Structures
    • J. Herranz and G. Saez. Ring Signature Schemes for General Ad-Hoc Access Structures. In Proceedings of ESAS 2004, pages 54-65.
    • Proceedings of ESAS 2004 , pp. 54-65
    • Herranz, J.1    Saez, G.2
  • 25
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • Ueli Maurer, editor, Advances in Cryptology, EuroCrypt '96, Berlin, Springer-Verlag
    • M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Ueli Maurer, editor, Advances in Cryptology - EuroCrypt '96, pages 143-154, Berlin, 1996. Springer-Verlag. Lecture Notes in Computer Science Volume 1070.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 26
    • 84941176979 scopus 로고    scopus 로고
    • Threshold Ring Signature Scheme Based on the Curve
    • Hidenori Kuwakado, Hatsukazu Tanaka. Threshold Ring Signature Scheme Based on the Curve. In IPSJ JOURNAL Abstract Vol.44, pages 8-32.
    • IPSJ JOURNAL Abstract , vol.44 , pp. 8-32
    • Kuwakado, H.1    Tanaka, H.2
  • 27
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Computing, 17(2):373-386, April 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 31
    • 35048889048 scopus 로고    scopus 로고
    • A Separable Threshold Ring Signature Scheme
    • ICISC 2003
    • Joseph K. Liu, Victor K. Wei, and Duncan S. Wong. A Separable Threshold Ring Signature Scheme. In ICISC 2003, LNCS 2971, pages 12-26.
    • LNCS , vol.2971 , pp. 12-26
    • Liu, J.K.1    Wei, V.K.2    Wong, D.S.3
  • 32
    • 35048825874 scopus 로고    scopus 로고
    • Linkable Spontaneous Anonymous Group Signatures for Ad Hoc Groups (Extended Abstract)
    • Springer-Verlag
    • J. K. Liu, V. K. Wei, and D. S. Wong. Linkable Spontaneous Anonymous Group Signatures for Ad Hoc Groups (Extended Abstract). In ACISP 2004, volume 3108 of LNCS, pages 325-335, Springer-Verlag, 2004.
    • (2004) ACISP 2004, volume 3108 of LNCS , pp. 325-335
    • Liu, J.K.1    Wei, V.K.2    Wong, D.S.3
  • 33
    • 79960836060 scopus 로고    scopus 로고
    • Deniable Ring Authentication
    • CRYPTO 2002, Springer-Verlag
    • Moni Naor. Deniable Ring Authentication. In CRYPTO 2002, LNCS 2442, pages 481-498. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 481-498
    • Naor, M.1
  • 34
    • 1142306654 scopus 로고
    • Digitalized signatures as intractable as factorization
    • Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, January
    • M. Rabin. Digitalized signatures as intractable as factorization. Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, January 1979.
    • (1979)
    • Rabin, M.1
  • 35
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 36
    • 85020598353 scopus 로고    scopus 로고
    • Adi Shamir Identity Based Cryptosystems and Signature Schemes. In Proceedings of CRYPTO 84, LNCS 196, pages 47-53. Springer-Verlag, 1984.
    • Adi Shamir Identity Based Cryptosystems and Signature Schemes. In Proceedings of CRYPTO 84, LNCS 196, pages 47-53. Springer-Verlag, 1984.
  • 39
    • 33646758450 scopus 로고    scopus 로고
    • Willy Susilo and Yi Mu. Deniable Ring Authentication Revisited. In Applied Cryptography and Network Security (ACNS 2004), LNCS 3089, pages 149-163. Springer-Verlag, 2004.
    • Willy Susilo and Yi Mu. Deniable Ring Authentication Revisited. In Applied Cryptography and Network Security (ACNS 2004), LNCS 3089, pages 149-163. Springer-Verlag, 2004.
  • 40
    • 37149042515 scopus 로고    scopus 로고
    • An Improved Identity-Based Ring Signature Scheme from Bilinear Pairings
    • MMRC, AMSS, Academia, Sinica, Beijing, December
    • Chunming Tang, Zhupjun Liu, and Mingsheng Wang. An Improved Identity-Based Ring Signature Scheme from Bilinear Pairings. In NM Research Preprints, pages 231-234. MMRC, AMSS, Academia, Sinica, Beijing, No. 22, December, 2003.
    • (2003) NM Research Preprints , Issue.22 , pp. 231-234
    • Tang, C.1    Liu, Z.2    Wang, M.3
  • 42
    • 84941192932 scopus 로고    scopus 로고
    • Victor K. Wei. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. In Cryptology ePrint Archive: Report 2004/039.
    • Victor K. Wei. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. In Cryptology ePrint Archive: Report 2004/039.
  • 43
    • 0142218983 scopus 로고    scopus 로고
    • On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
    • Information and Communications Security ICICS'03, Springer-Verlag
    • Ducan S. Wong, Karyin Fung, Joseph K. Liu, and Victor K. Wei. On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. In Information and Communications Security (ICICS'03), LNCS 2836, pages 34-46. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2836 , pp. 34-46
    • Wong, D.S.1    Fung, K.2    Liu, J.K.3    Wei, V.K.4
  • 45
    • 84958765355 scopus 로고    scopus 로고
    • ID-Based Blind Signature and Ring Signature from Pairings
    • ASIACRYPT 2002, Springer-Verlag
    • Fangguo Zhang and Kwangjo Kim. ID-Based Blind Signature and Ring Signature from Pairings. In ASIACRYPT 2002, LNCS 2501, pages 533-547. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 533-547
    • Zhang, F.1    Kim, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.