메뉴 건너뛰기




Volumn , Issue , 2005, Pages 40-46

Anonymous yet accountable access control

Author keywords

Access Control; Accountability; Anonymous Credentials; Anonymous Transactions; Certificates; Privacy

Indexed keywords

COMPUTER ARCHITECTURE; CRYPTOGRAPHY; DATA PRIVACY; DECISION MAKING; KNOWLEDGE ENGINEERING; RESOURCE ALLOCATION;

EID: 33749001998     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102199.1102208     Document Type: Conference Paper
Times cited : (45)

References (32)
  • 2
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • BONATTI, P. A., AND SAMARATI, P. A uniform framework for regulating service access and information release on the web. J. Comput. Secur. 10, 3 (2002), 241-271.
    • (2002) J. Comput. Secur. , vol.10 , Issue.3 , pp. 241-271
    • Bonatti, P.A.1    Samarati, P.2
  • 3
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • EUROCRYPT 2000, Springer Verlag
    • BOUDOT, F. Efficient proofs that a committed number lies in an interval. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
    • LNCS , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 4
    • 84957366640 scopus 로고    scopus 로고
    • Rapid demonstration of linear relations connected by boolean operators
    • EUROCRYPT'97, Springer Verlag
    • BRANDS, S. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT'97, vol. 1233 of LNCS, Springer Verlag, pp. 318-333.
    • LNCS , vol.1233 , pp. 318-333
    • Brands, S.1
  • 5
    • 33745852669 scopus 로고    scopus 로고
    • Group signatures: Better efficiency and new theoretical aspects
    • LNCS, Springer Verlag
    • CAMENISCH, J., AND GROTH, J. Group signatures: Better efficiency and new theoretical aspects. In SCN 2004, pp. 120-133. LNCS, Springer Verlag.
    • SCN 2004 , pp. 120-133
    • Camenisch, J.1    Groth, J.2
  • 6
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • EUROCRYPT 2001, Springer Verlag
    • CAMENISCH, J., AND LYSYANSKAYA, A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT 2001, vol. 2045 of LNCS, Springer Verlag, pp. 93-118.
    • LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • SCN 2002, Springer Verlag
    • CAMENISCH, J., AND LYSYANSKAYA, A. A signature scheme with efficient protocols. In SCN 2002, vol. 2576 of LNCS, Springer Verlag, pp. 274-295.
    • LNCS , vol.2576 , pp. 274-295
    • Camenisch, J.1    Lysyanskaya, A.2
  • 8
    • 24944577209 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • LNCS, Springer Verlag
    • CAMENISCH, J., AND LYSYANSKAYA, A. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, LNCS, Springer Verlag.
    • CRYPTO 2004
    • Camenisch, J.1    Lysyanskaya, A.2
  • 9
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • EUROCRYPT '99
    • CAMENISCH, J., AND MICHELS, M. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, vol. 1592 of LNCS.
    • LNCS , vol.1592
    • Camenisch, J.1    Michels, M.2
  • 10
    • 84921060028 scopus 로고    scopus 로고
    • Separability and efficiency for generic group signature schemes
    • CRYPTO '99, Springer Verlag
    • CAMENISCH, J., AND MICHELS, M. Separability and efficiency for generic group signature schemes. In CRYPTO '99, vol. 1666 of LNCS, Springer Verlag, pp. 413-430.
    • LNCS , vol.1666 , pp. 413-430
    • Camenisch, J.1    Michels, M.2
  • 11
    • 14844283355 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • LNCS. Springer Verlag
    • CAMENISCH, J., AND SHOUP, V. Practical verifiable encryption and decryption of discrete logarithms. In CRYPTO 2003, LNCS. Springer Verlag.
    • CRYPTO 2003
    • Camenisch, J.1    Shoup, V.2
  • 12
    • 33749000965 scopus 로고    scopus 로고
    • A general certification framework with applications to privacy-enhancing certificate infrastructures
    • IBM Research, July
    • CAMENISCH, J., SOMMER, D., AND ZIMMERMANN, R. A general certification framework with applications to privacy-enhancing certificate infrastructures. Tech. Rep. RZ 3629, IBM Research, July 2005.
    • (2005) Tech. Rep. , vol.RZ 3629
    • Camenisch, J.1    Sommer, D.2    Zimmermann, R.3
  • 13
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - Easy go divisible cash
    • EUROCRYPT'98, Springer Verlag
    • CHAN, A., FRANKEL, Y., AND TSIOUNIS, Y. Easy come - easy go divisible cash. In EUROCRYPT'98, vol. 1403 of LNCS, Springer Verlag, pp. 561-575.
    • LNCS , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 14
    • 85001025766 scopus 로고    scopus 로고
    • Wallet databases with observers
    • CRYPTO '92, Springer-Verlag
    • CHAUM, D., AND PEDERSEN, T. P. Wallet databases with observers. In CRYPTO '92, vol. 740 of LNCS, Springer-Verlag, pp. 89-105.
    • LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 15
    • 85016672373 scopus 로고    scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • CRYPTO '94, Springer Verlag
    • CRAMER, R., DAMGÅRD, I., AND SCHOENMAKERS, B. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPTO '94, vol. 839 of LNCS, Springer Verlag, pp. 174-187.
    • LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 16
    • 84948970500 scopus 로고    scopus 로고
    • Efficient concurrent zero-knowledge in the auxiliary string model
    • EUROCRYPT 2000, Springer Verlag
    • DAMGÅRD, I. Efficient concurrent zero-knowledge in the auxiliary string model. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
    • LNCS , vol.1807 , pp. 431-444
    • Damgård, I.1
  • 17
    • 23044533897 scopus 로고    scopus 로고
    • An integer commitment scheme based on groups with hidden order
    • ASIACRYPT 2002
    • DAMGÅRD, I., AND FUJISAKI, E. An integer commitment scheme based on groups with hidden order. In ASIACRYPT 2002, vol. 2501 of LNCS.
    • LNCS , vol.2501
    • Damgård, I.1    Fujisaki, E.2
  • 18
    • 0000244582 scopus 로고    scopus 로고
    • Threshold cryptography
    • CRYPTO '89
    • DESMEDT, Y., AND FRANKEL, Y. Threshold cryptography. In CRYPTO '89, vol. 435 of LNCS, pp. 307-315.
    • LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 19
    • 79957729771 scopus 로고
    • Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • EUROPEAN PARLIAMENT. Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities 31 (1995).
    • (1995) Official Journal of the European Communities , vol.31
  • 20
    • 0038150613 scopus 로고    scopus 로고
    • An Internet attribute certificate profile for authorization
    • (Proposed Standard), Apr.
    • FARRELL, S., AND HOUSLEY, R. An Internet Attribute Certificate Profile for Authorization. RFC 3281 (Proposed Standard), Apr. 2002.
    • (2002) RFC , vol.3281
    • Farrell, S.1    Housley, R.2
  • 21
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • CRYPTO '97
    • FUJISAKI, E., AND OKAMOTO, T. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, vol. 1294 of LNCS, pp. 16-30.
    • LNCS , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 22
    • 0021941417 scopus 로고    scopus 로고
    • The knowledge complexity of interactive proof systems
    • GOLDWASSER, S., MICALI, S., AND RACKOFF, C. The knowledge complexity of interactive proof systems. In FOCS 1985, pp. 291-304.
    • FOCS 1985 , pp. 291-304
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 23
    • 0011255177 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
    • (Proposed Standard), Apr.
    • HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), Apr. 2002.
    • (2002) RFC , vol.3280
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 25
    • 84982943258 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • CRYPTO '91, Springer Verlag
    • PEDERSEN, T. P. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91, vol. 576 of LNCS, Springer Verlag, pp. 129-140.
    • LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 26
    • 77953565379 scopus 로고    scopus 로고
    • Whitepaper, 18 July
    • Prime whitepaper. Whitepaper, 18 July 2005. http://www.prime-project.eu. org/prime/public/press_room/whitepaper/PRIME-Whitepaper-V1.pdf.
    • (2005) Prime Whitepaper
  • 27
    • 33748992110 scopus 로고    scopus 로고
    • June. Personal communication
    • SAMARATI, P., June 2005. Personal communication.
    • (2005)
    • Samarati, P.1
  • 29
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • SCHNORR, C. P. Efficient signature generation for smart cards. Journal of Cryptology 4, 3 (1991), 239-252.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 30
    • 0034449542 scopus 로고    scopus 로고
    • Prunes: An efficient and complete strategy for automated trust negotiation over the internet
    • ACM Press
    • Yu, T., MA, X., AND WINSLETT, M. Prunes: an efficient and complete strategy for automated trust negotiation over the internet. In ACM CCS'00, ACM Press, pp. 210-219.
    • ACM CCS'00 , pp. 210-219
    • Yu, T.1    Ma, X.2    Winslett, M.3
  • 31
    • 0035747337 scopus 로고    scopus 로고
    • Interoperable strategies in automated trust negotiation
    • Yu, T., WINSLETT, M., AND SEAMONS, K. E. Interoperable strategies in automated trust negotiation. In ACM CCS '01, pp. 146-155.
    • ACM CCS '01 , pp. 146-155
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 32
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu, T., WINSLETT, M., AND SEAMONS, K. E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6, 1 (2003), 1-42.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.