메뉴 건너뛰기




Volumn , Issue , 2006, Pages 201-210

How to win the clonewars: Efficient periodic n-times anonymous authentication

Author keywords

Clone detection; Credentials; N anonymous authentication

Indexed keywords

CLONE DETECTION; CREDENTIALS; N-ANONYMOUS AUTHENTICATION;

EID: 34547379480     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180431     Document Type: Conference Paper
Times cited : (186)

References (47)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO, vol. 1880, p. 255-270, 2000.
    • (2000) CRYPTO , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 2
    • 85180411878 scopus 로고    scopus 로고
    • Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In NDSS, p. 29-13, 2005.
    • (2005) NDSS , pp. 29-13
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 3
    • 34547375847 scopus 로고    scopus 로고
    • L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation-Resistant Storage. Johns Hopkins University, Technical Report # TR-SP-BGMM-050705, 2005.
    • L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation-Resistant Storage. Johns Hopkins University, Technical Report # TR-SP-BGMM-050705, 2005.
  • 4
    • 84957360970 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • N. Baric and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In EUROCRYPT '97, volume 1233, p. 480-194, 1997.
    • (1997) EUROCRYPT '97 , vol.1233 , pp. 480-194
    • Baric, N.1    Pfitzmann, B.2
  • 5
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • EUROCRYPT, v. of
    • D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT, v.3027 of LNCS, p. 56-73, 2004.
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 6
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures using strong DifHe-Hellman
    • CRYPTO, of
    • D. Boneh, X. Boyen, and H. Shacham. Short group signatures using strong DifHe-Hellman. In CRYPTO, volume 3152 of LNCS, p. 41-55, 2004.
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, v.2139, p. 213-229, 2001.
    • (2001) CRYPTO , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • F. Boudot. Efficient proofs that a committed number lies in an interval. In EUROCRYPT, vol. 1807, p. 431-144, 2000.
    • (2000) EUROCRYPT , vol.1807 , pp. 431-144
    • Boudot, F.1
  • 10
    • 84995460223 scopus 로고
    • Trustee-based tracing extensions to anonymous cash and the making of anonymous change
    • E. Brickell, P. Gemmel, and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In SIAM, p. 457-166, 1995.
    • (1995) SIAM , pp. 457-166
    • Brickell, E.1    Gemmel, P.2    Kravitz, D.3
  • 11
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
    • ASIACRYPT, of
    • J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In ASIACRYPT, volume 1976 of LNCS, p. 331-345, 2000.
    • (2000) LNCS , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgård, I.2
  • 12
    • 24944435537 scopus 로고    scopus 로고
    • Compact E-Cash
    • EUROCRYPT, of
    • J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact E-Cash. In EUROCRYPT, volume 3494 of LNCS, p. 302-321, 2005.
    • (2005) LNCS , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 13
    • 33750024803 scopus 로고    scopus 로고
    • Balancing accountability and privacy using e-cash
    • to appear
    • J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Balancing accountability and privacy using e-cash. In SCN (to appear), 2006.
    • (2006) In SCN
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 14
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • EUROCRYPT, of
    • J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT, volume 2045 of LNCS, p. 93-118, 2001.
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 15
    • 84937428748 scopus 로고    scopus 로고
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO, 2442 of LNCS, p. 61-76, 2002.
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO, 2442 of LNCS, p. 61-76, 2002.
  • 16
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • SCN 2002, of
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, volume 2576 of LNCS, p. 268-289, 2003.
    • (2003) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 17
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • CRYPTO 2004, of
    • J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, volume 3152 of LNCS, p. 56-72, 2004.
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 18
    • 84949745296 scopus 로고    scopus 로고
    • Digital payment systems with passive anonymity-revoking trustees
    • ESORICS 96, of
    • J. Camenisch, U. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In ESORICS 96, volume 1146 of LNCS, p. 33-13, 1996.
    • (1996) LNCS , vol.1146 , pp. 33-13
    • Camenisch, J.1    Maurer, U.2    Stadler, M.3
  • 19
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, volume 1592, p. 107-122, 1999.
    • (1999) EUROCRYPT '99 , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 20
    • 84921060028 scopus 로고    scopus 로고
    • Separability and efficiency for generic group signature schemes
    • CRYPTO '99, of
    • J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In CRYPTO '99, volume 1666 of LNCS, p. 413-430, 1999.
    • (1999) LNCS , vol.1666 , pp. 413-430
    • Camenisch, J.1    Michels, M.2
  • 21
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • CRYPTO '97, of
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In CRYPTO '97, volume 1296 of LNCS, p. 410-124, 1997.
    • (1997) LNCS , vol.1296 , pp. 410-124
    • Camenisch, J.1    Stadler, M.2
  • 22
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - easy go divisible cash
    • A. Chan, Y. Frankel, and Y. Tsiounis. Easy come - easy go divisible cash. In EUROCRYPT, v. 1403, p. 561-575, 1998.
    • (1998) EUROCRYPT , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 23
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Plenum Press
    • D. Chaum. Blind signatures for untraceable payments. In CRYPTO '82, p. 199-203. Plenum Press, 1982.
    • (1982) CRYPTO '82 , pp. 199-203
    • Chaum, D.1
  • 24
    • 0003062028 scopus 로고
    • Blind signature systems
    • Plenum
    • D. Chaum. Blind signature systems. In CRYPTO '83, p. 153-156. Plenum, 1983.
    • (1983) CRYPTO '83 , pp. 153-156
    • Chaum, D.1
  • 25
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, Oct. 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 26
    • 84929273746 scopus 로고
    • Untraceable electronic cash
    • CRYPTO, of
    • D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO, volume 403 of LNCS, p. 319-327, 1990.
    • (1990) LNCS , vol.403 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 27
    • 85024290278 scopus 로고
    • Group signatures
    • EUROCRYPT '91, of
    • D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT '91, volume 547 of LNCS, p. 257-265, 1991.
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 28
    • 24144487020 scopus 로고    scopus 로고
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In TCC, 3378 of LNCS, p. 363-385, 2005.
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In TCC, volume 3378 of LNCS, p. 363-385, 2005.
  • 29
    • 33746048789 scopus 로고    scopus 로고
    • Unclonable group identification
    • EUROCRYPT, of
    • I. Damgard, K. Dupont, and M. O. Pedersen. Unclonable group identification. In EUROCRYPT, volume 4004 of LNCS, p. 555-572, 2006.
    • (2006) LNCS , vol.4004 , pp. 555-572
    • Damgard, I.1    Dupont, K.2    Pedersen, M.O.3
  • 30
    • 85031802442 scopus 로고
    • Payment systems and credential mechanism with provable security against abuse by individuals
    • CRYPTO, of
    • I. B. Damgård. Payment systems and credential mechanism with provable security against abuse by individuals. In CRYPTO, volume 403 of LNCS, p. 328-335, 1990.
    • (1990) LNCS , vol.403 , pp. 328-335
    • Damgård, I.B.1
  • 31
    • 84958742006 scopus 로고    scopus 로고
    • Efficient construction of (distributed) verifiable random functions
    • Y. Dodis. Efficient construction of (distributed) verifiable random functions. In PKC, volume 2567, p. 1-17, 2003.
    • (2003) PKC , vol.2567 , pp. 1-17
    • Dodis, Y.1
  • 32
    • 24144481228 scopus 로고    scopus 로고
    • Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs an Keys. In PKC, 3386 of LNCS, p. 416-431, 2005.
    • Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs an Keys. In PKC, volume 3386 of LNCS, p. 416-431, 2005.
  • 33
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • CRYPTO, of
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO, volume 263 of LNCS, p. 186-194, 1986.
    • (1986) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 34
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • CRYPTO '97, of
    • E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, volume 1294 of LNCS, p. 16-30, 1997.
    • (1997) LNCS , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 35
    • 84946832010 scopus 로고    scopus 로고
    • Supersingular curves in cryptography
    • ASIACRYPT, of
    • S. D. Galbraith. Supersingular curves in cryptography. In ASIACRYPT, volume 2248 of LNCS, p. 495-513, 2001.
    • (2001) LNCS , vol.2248 , pp. 495-513
    • Galbraith, S.D.1
  • 36
    • 35048900318 scopus 로고    scopus 로고
    • Handcuffing big brother: An abuse-resilient transaction escrow scheme
    • EUROCRYPT, of
    • S. Jarecki and V. Shmatikov. Handcuffing big brother: an abuse-resilient transaction escrow scheme. In EUROCRYPT, volume 3027 of LNCS, p. 590-608, 2004.
    • (2004) LNCS , vol.3027 , pp. 590-608
    • Jarecki, S.1    Shmatikov, V.2
  • 37
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • A. Kiayias, M. Yung, and Y. Tsiounis. Traceable signatures. In EUROCRYPT, vol. 3027, p. 571-589, 2004.
    • (2004) EUROCRYPT , vol.3027 , pp. 571-589
    • Kiayias, A.1    Yung, M.2    Tsiounis, Y.3
  • 40
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • CT-RSA, of
    • N. McCullagh and P. S. L. M. Barreto. A new two-party identity-based authenticated key agreement. In CT-RSA, volume 3376 of LNCS, p. 262-274, 2004.
    • (2004) LNCS , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 41
    • 0010227312 scopus 로고
    • Complexity of a determinate algorithm for the discrete log
    • V. I. Nechaev. Complexity of a determinate algorithm for the discrete log. Mathematical Notes, 55:165-172, 1994.
    • (1994) Mathematical Notes , vol.55 , pp. 165-172
    • Nechaev, V.I.1
  • 42
    • 26444607972 scopus 로고    scopus 로고
    • Dynamic k-times anonymous authentication
    • ACNS, in
    • L. Nguyen and R. Safavi-Naini. Dynamic k-times anonymous authentication. In ACNS, volume 3531 in LNCS, p. 318-333, 2005.
    • (2005) LNCS , vol.3531 , pp. 318-333
    • Nguyen, L.1    Safavi-Naini, R.2
  • 43
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • CRYPTO, of
    • T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO, volume 576 of LNCS, p. 129-140, 1992.
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 45
    • 84942550160 scopus 로고    scopus 로고
    • V. Shoup. Lower bounds for discrete logarithms and related problems. In EUROCRYPT, LNCS, p. 256-266, 1997. Update: http://www.shoup.net/papers/.
    • V. Shoup. Lower bounds for discrete logarithms and related problems. In EUROCRYPT, LNCS, p. 256-266, 1997. Update: http://www.shoup.net/papers/.
  • 47
    • 35048839792 scopus 로고    scopus 로고
    • k-times anonymous authentication (extended abstract)
    • Asiacrypt, of
    • I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In Asiacrypt, volume 3329 of LNCS, p. 308-322, 2004.
    • (2004) LNCS , vol.3329 , pp. 308-322
    • Teranishi, I.1    Furukawa, J.2    Sako, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.