메뉴 건너뛰기




Volumn 201, Issue , 2006, Pages 25-37

A general certification framework with applications to privacy-enhancing certificate infrastructures

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SPECIFICATION LANGUAGES; SPECIFICATIONS;

EID: 33845547238     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-33406-8_3     Document Type: Article
Times cited : (20)

References (30)
  • 2
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • In of LNCS, Springer Verlag
    • Boudot, F. Efficient proofs that a committed number lies in an interval. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
    • (2000) EUROCRYPT , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 3
    • 84957366640 scopus 로고    scopus 로고
    • Rapid demonstration of linear relations connected by boolean operators
    • In '97 of LNCS, Springer Verlag
    • Brands, S. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT '97 (1997), vol. 1233 of LNCS, Springer Verlag, pp. 318-333.
    • (1997) EUROCRYPT , vol.1233 , pp. 318-333
    • Brands, S.1
  • 4
    • 0003808928 scopus 로고    scopus 로고
    • Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy
    • PhD thesis, Eindhoven Institute of Technology, Eindhoven, The Netherlands
    • Brands, S. Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy. PhD thesis, Eindhoven Institute of Technology, Eindhoven, The Netherlands, 1999.
    • (1999)
    • Brands, S.1
  • 5
    • 14844295011 scopus 로고    scopus 로고
    • Direct anonymous attestation
    • ACM Press
    • Brickell, E., Camenisch, J., and Chen, L. Direct anonymous attestation. In ACM CCS '04, ACM Press, pp. 132-145.
    • ACM CCS '04 , pp. 132-145
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 6
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
    • In of LNCS, Springer Verlag
    • Camenisch, J., and Damgård, I. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In ASIACRYPT 2000, vol. 1976 of LNCS, Springer Verlag, pp. 331-345.
    • (2000) ASIACRYPT , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgård, I.2
  • 8
    • 24944577209 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • In Springer Verlag
    • Camenisch, J., and Lysyanskaya, A. Signature schemes and anonymous credentials from bilinear maps. In CRYPT0 2004, Springer Verlag.
    • (2004) CRYPT0
    • Camenisch, J.1    Lysyanskaya, A.2
  • 9
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • In of LNCS, Springer Verlag
    • Camenisch, J., and Michels, M. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, vol. 1592 of LNCS, Springer Verlag, pp. 107-122.
    • EUROCRYPT '99 , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 10
    • 84921060028 scopus 로고    scopus 로고
    • Separability and efficiency for generic group signature schemes
    • In of LNCS, Springer Verlag
    • Camenisch, J., and Michels, M. Separability and efficiency for generic group signature schemes. In CRYPTO '99 (1999), vol. 1666 of LNCS, Springer Verlag, pp. 413-430.
    • (1999) CRYPTO '99 , vol.1666 , pp. 413-430
    • Camenisch, J.1    Michels, M.2
  • 11
    • 14844283355 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • In LNCS
    • Camenisch, J., and Shoup, V. Practical verifiable encryption and decryption of discrete logarithms. In CRYPTO 2003, LNCS.
    • (2003) CRYPTO
    • Camenisch, J.1    Shoup, V.2
  • 12
    • 33845539828 scopus 로고    scopus 로고
    • Tech. Rep. Research Report RZ 3646, IBM Zurich Research Laboratory
    • Camenisch, J., and Sommer, D. Tech. Rep. Research Report RZ 3646, IBM Zurich Research Laboratory, 2006.
    • (2006)
    • Camenisch, J.1    Sommer, D.2
  • 13
    • 33749000965 scopus 로고    scopus 로고
    • A general certification framework with applications to privacy-enhancing certificate infrastructures
    • Tech. Rep. 3629, IBM Zurich Research Laboratory, November
    • Camenisch, J., Sommer, D., and Zimmermann, R. A general certification framework with applications to privacy-enhancing certificate infrastructures. Tech. Rep. 3629, IBM Zurich Research Laboratory, November 2005.
    • (2005)
    • Camenisch, J.1    Sommer, D.2    Zimmermann, R.3
  • 14
    • 0008317070 scopus 로고    scopus 로고
    • Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem
    • PhD thesis, ETH Zürich, 1998. Diss. ETH No. 12520, Hartung Gorre Verlag, Konstanz
    • Camenisch, J. L. Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem. PhD thesis, ETH Zürich, 1998. Diss. ETH No. 12520, Hartung Gorre Verlag, Konstanz.
    • Camenisch, J.L.1
  • 15
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - Easy go divisible cash
    • In of LNCS, Springer Verlag
    • Chan, A, Frankel, Y., and Tsiounis, Y. Easy come - easy go divisible cash. In EUROCRYPT '98 (1998), vol. 1403 of LNCS, Springer Verlag, pp. 561-575.
    • (1998) EUROCRYPT '98 , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 16
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • (Feb.)
    • Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (Feb. 1981), 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 17
    • 0003062028 scopus 로고    scopus 로고
    • Blind signature systems
    • In Plenum Press
    • Chaum, D. Blind signature systems. In CRYPTO '83, Plenum Press, p. 153.
    • CRYPTO '83 , pp. 153
    • Chaum, D.1
  • 18
    • 85001025766 scopus 로고    scopus 로고
    • Wallet databases with observers
    • In of LNCS, Springer-Verlag
    • Chaum, D., and Pedersen, T. P. Wallet databases with observers. In CRYPTO '92, vol. 740 of LNCS, Springer-Verlag, pp. 89-105.
    • CRYPTO '92 , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 19
    • 85024290278 scopus 로고
    • Group signatures
    • In of LNCS, Springer-Verlag
    • Chaum, D., and van Heyst, E. Group signatures. In EUROCRYPT '91 (1991), vol. 547 of LNCS, Springer-Verlag, pp. 257-265.
    • (1991) EUROCRYPT '91 , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 20
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • In of LNCS, Springer Verlag
    • Cramer, R., Damgård, I., and Schoenmakers, B. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPT0 '94 (1994), vol. 839 of LNCS, Springer Verlag, pp. 174-187.
    • (1994) CRYPT0 '94 , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 21
    • 23044520104 scopus 로고    scopus 로고
    • Efficient concurrent zero-knowledge in the auxiliary string model
    • In of LNCS, Springer Verlag
    • Damgård, I. Efficient concurrent zero-knowledge in the auxiliary string model. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
    • (2000) EUROCRYPT , vol.1807 , pp. 431-444
    • Damgård, I.1
  • 22
    • 23044533897 scopus 로고    scopus 로고
    • An integer commitment scheme based on groups with hidden order
    • In of LNCS, Springer
    • Damgård, I., and Fujisaki, E. An integer commitment scheme based on groups with hidden order. In ASAACRYPT 2002, vol. 2501 of LNCS, Springer.
    • (2002) ASAACRYPT , vol.2501
    • Damgård, I.1    Fujisaki, E.2
  • 23
    • 84990731886 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • In of LNCS, Springer Verlag
    • Fiat, A., and Shamir, A. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, vol. 263 of LNCS, Springer Verlag, pp. 186-194.
    • CRYPTO '86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 24
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • In of LNCS, Springer Verlag
    • Fujisaki, E., and Okamoto, T. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, vol. 1294 of LNCS, Springer Verlag, pp. 16-30.
    • CRYPTO '97 , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 25
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • In of LNCS, Springer
    • Kiayias, A., Tsiounis, Y., and Yung, M. Traceable signatures. In EUROCRYPT, vol. 3027 of LNCS, Springer, pp. 571-589.
    • EUROCRYPT , vol.3027 , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 26
    • 33845531277 scopus 로고    scopus 로고
    • Identity escrow
    • Theory of Cryptography Library, Record Nr. 97-11
    • Kilian, J., and Petrank, E. Identity escrow. Theory of Cryptography Library, Record Nr. 97-11, http://theory.lcs.mit.edu/~tcryptol,Aug. 1997.
    • (1997)
    • Kilian, J.1    Petrank, E.2
  • 27
    • 84982943258 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • In of LNCS, Springer Verlag
    • Pedersen, T. P. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91, vol. 576 of LNCS, Springer Verlag, pp. 129-140.
    • CRYPTO '91 , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 28
    • 33845541552 scopus 로고    scopus 로고
    • PRIME project
    • PRIME project. www.prime-project.eu.org.
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • (Feb.)
    • Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb. 1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 30
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • Schnorr, C. P. Efficient signature generation for smart cards. Journal of Cryptology 4, 3 (1991), 239-252.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.