메뉴 건너뛰기




Volumn 4521 LNCS, Issue , 2007, Pages 270-287

Unlinkable secret handshakes and key-private group key management schemes

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; NETWORK PROTOCOLS; NETWORK SECURITY; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 38049060325     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72738-5_18     Document Type: Conference Paper
Times cited : (49)

References (23)
  • 2
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHAES
    • M. Abdalla, M. Bellare, and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHAES. In CT-RSA, pages 143-158, 2001.
    • (2001) CT-RSA , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 4
    • 0842283854 scopus 로고    scopus 로고
    • Randomness re-use in multi-recipient encryption schemes
    • Public-Key Cryptography '03, Proceedings, of, Springer-Verlag
    • M. Bellare, A. Boldyreva, and J. staddon. Randomness re-use in multi-recipient encryption schemes. In Public-Key Cryptography '03, Proceedings, volume 2567 of Lecture Notes in Computer Science. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2567
    • Bellare, M.1    Boldyreva, A.2    staddon, J.3
  • 5
    • 38049087403 scopus 로고    scopus 로고
    • Private encrypted content distribution using private broadcast encryption
    • A Barth, D Boneh, and B. Waters. Private encrypted content distribution using private broadcast encryption. In Proceedings of Financial Crypto, 2006.
    • (2006) Proceedings of Financial Crypto
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 8
    • 84929273746 scopus 로고
    • Untraceable electronic cash
    • Proc. Crypto'88, of, Springer-Verlag
    • D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Proc. Crypto'88, volume 403 of LNCS, pages 319-327. Springer-Verlag, 1988.
    • (1988) LNCS , vol.403 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 11
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Proc. Eurocrypt '01, pages 93-118, 2001.
    • (2001) Proc. Eurocrypt '01 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 14844304181 scopus 로고    scopus 로고
    • Public key broadcast encryption for stateless receivers
    • Y. Dodis and N. Fazio. Public key broadcast encryption for stateless receivers. In Digital Rights Management Workshop, pages 61-80, 2002.
    • (2002) Digital Rights Management Workshop , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 13
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • August
    • E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology-CRYPTO'99, pages 537-554, August 1999.
    • (1999) Advances in Cryptology-CRYPTO'99 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 15
    • 38049038226 scopus 로고    scopus 로고
    • Authenticated group key agreement protocols with the privacy property of affiliation-hiding
    • S. Jarecki, J. Kim, and G. Tsudik. Authenticated group key agreement protocols with the privacy property of affiliation-hiding. In RSA Conference - Cryptography Track, 2007.
    • (2007) RSA Conference - Cryptography Track
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 16
    • 38049007799 scopus 로고    scopus 로고
    • Beyond secret handshakes: Affiliation-hiding authenticated key exchange protocols with perfect forward privacy
    • manuscript
    • S. Jarecki, J. Kim, and G. Tsudik. Beyond secret handshakes: Affiliation-hiding authenticated key exchange protocols with perfect forward privacy, manuscript, 2007.
    • (2007)
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 20
    • 38049022402 scopus 로고    scopus 로고
    • International Workshop on Coding and Cryptography, Bergen, Norway
    • D. Vergnaud. RSA-based secret handshakes. In In International Workshop on Coding and Cryptography, Bergen, Norway, 2005.
    • (2005) RSA-based secret handshakes
    • Vergnaud, D.1
  • 21
    • 0002360030 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. Wong, M. Gouda, and S. Lam. Secure group communications using key graphs. In SIGCOMM '98, 1998.
    • (1998) SIGCOMM '98
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 23
    • 14844289583 scopus 로고    scopus 로고
    • Shouhuai Xu and Moti Yung, k-anonymous secret handshakes with reusable credentials. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 158-167, New York, NY, USA, 2004. ACM Press.
    • Shouhuai Xu and Moti Yung, k-anonymous secret handshakes with reusable credentials. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 158-167, New York, NY, USA, 2004. ACM Press.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.