메뉴 건너뛰기




Volumn 201, Issue , 2006, Pages 135-147

Protecting (anonymous) credentials with the Trusted Computing Group's TPM V1.2

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER HARDWARE; COMPUTER PRIVACY; HARDWARE; HARDWARE SECURITY; SECURITY OF DATA;

EID: 33845516445     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-33406-8_12     Document Type: Article
Times cited : (17)

References (21)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • In of LNCS, Springer Verlag
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO 2000, vol. 1880 of LNCS, pp. 255-270. Springer Verlag, 2000.
    • (2000) CRYPTO 2000 , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 2
    • 0010254150 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • In of LNCS
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, vol. 1087 of LNCS, pp. 139-155.
    • (2000) EUROCRYPT , vol.1087 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM CCS, pp. 244-250, 1993.
    • (1993) ACM CCS , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 84957366640 scopus 로고    scopus 로고
    • Rapid demonstration of linear relations connected by boolean operators
    • In of LNCS, Springer Verlag
    • S. Brands. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT '97, vol. 1233 of LNCS, pp. 318-333. Springer Verlag, 1997.
    • (1997) EUROCRYPT '97 , vol.1233 , pp. 318-333
    • Brands, S.1
  • 5
    • 26444450117 scopus 로고    scopus 로고
    • Direct anonymous attestation
    • In acm press
    • E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In ACM CSS, pp. 225-234. acm press, 2004.
    • (2004) ACM CSS , pp. 225-234
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 6
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • In of LNCS, Springer Verlag 2001
    • J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT 2001, vol. 2045 of LNCS, pp. 93-118. Springer Verlag, 2001.
    • (2001) EUROCRYPT , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • In Springer Verlag, 2003
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, vol. 2576 of LNCS, pp. 268-289. Springer Verlag, 2003.
    • (2002) SCN of LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 8
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • In of LNCS
    • J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, vol. 1592 of LNCS, pp. 107-122.
    • EUROCRYPT '99 , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 9
    • 0002882557 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • In of LNCS, Springer Verlag
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In CRYPTO '97, vol. 1296 of LNCS, pp. 410-424. Springer Verlag, 1997.
    • (1997) CRYPTO '97 , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 10
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - Easy go divisible cash
    • In of LNCS, Springer Verlag
    • A. Chan, Y. Frankel, and Y. Tsiounis. Easy come - easy go divisible cash. In EUROCRYPT '98, vol. 1403 of LNCS, pp. 561-575. Springer Verlag, 1998.
    • (1998) EUROCRYPT '98 , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 11
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications ojthe ACM, 28(10): 1030-1044, Oct. 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 12
    • 84862489679 scopus 로고
    • Wallet databases with observers
    • In of LNCS, Springer-Verlag
    • D. Chaum and T. P. Pedersen. Wallet databases with observers. In CRYPTO '92, vol. 740 of LNCS, pp. 89-105. Springer-Verlag, 1993.
    • (1993) CRYPTO '92 , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 13
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • In of LNCS, Springer Verlag
    • R. Cramer, I. Damgåd, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPTO '94, vol. 839 of LNCS, pp. 174-187. Springer Verlag, 1994.
    • (1994) CRYPTO '94 , vol.839 , pp. 174-187
    • Cramer, R.1    Damgåd, I.2    Schoenmakers, B.3
  • 14
    • 23044533897 scopus 로고    scopus 로고
    • An integer commitment scheme based on groups with hidden order
    • In of LNCS. Springer, 2002
    • I. Damgård and E. Fujisaki. An integer commitment scheme based on groups with hidden order. In ASIACRYPT 2002, vol. 2501 of LNCS. Springer, 2002.
    • (2002) ASIACRYPT , vol.2501
    • Damgård, I.1    Fujisaki, E.2
  • 15
    • 84990731886 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • In of LNCS
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, vol. 263 of LNCS, pp. 186-194.
    • CRYPTO '86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 16
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • of LNCS In
    • E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, vol. 1294 of LNCS, pp. 16-30.
    • CRYPTO '97 , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 17
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • In of LNCS Springer Verlag
    • R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In EUROCRYPT 2003, vol. 2656 of LNCS, pp. 524-543. Springer Verlag,
    • EUROCRYPT 2003 , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 18
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • In of LNCS Springer Verlag
    • T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91, vol. 576 of LNCS, pp. 129-140. Springer Verlag, 1992.
    • (1992) CRYPTO '91 , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 19
    • 0017930809 scopus 로고    scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126.
    • Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 20
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239-252, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 21
    • 33845529813 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG TPM specification 1.2. Available at
    • Trusted Computing Group. TCG TPM specification 1.2. Available at www.trustedcomputinggroup.org, 2003.
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.