메뉴 건너뛰기




Volumn 5037 LNCS, Issue , 2008, Pages 55-74

PPAA: Peer-to-peer anonymous authentication

Author keywords

Anonymous authentication; Credentials; Privacy; Reputation systems; Secret handshakes; VANets

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CLIENT SERVER COMPUTER SYSTEMS; COMPUTER NETWORKS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; INTELLIGENT VEHICLE HIGHWAY SYSTEMS; INTERNET; METROPOLITAN AREA NETWORKS; NETWORK ARCHITECTURE; NETWORK PROTOCOLS; NETWORK SECURITY; NUMERICAL METHODS; SERVERS; TELECOMMUNICATION NETWORKS;

EID: 45749125686     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68914-0_4     Document Type: Conference Paper
Times cited : (25)

References (40)
  • 3
    • 84957616594 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures (extended abstract)
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures (extended abstract). In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 591-606. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 591-606
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 4
    • 45749155233 scopus 로고    scopus 로고
    • Ateniese, G., Blanton, M., Kirsch, J.: Secret Handshakes with Dynamic and Fuzzy Matching. In: NDSS, The Internet Society (2007)
    • Ateniese, G., Blanton, M., Kirsch, J.: Secret Handshakes with Dynamic and Fuzzy Matching. In: NDSS, The Internet Society (2007)
  • 5
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 6
    • 33746354988 scopus 로고    scopus 로고
    • Au, M.H., Susilo, W., Yiu, S.-M.: Event-oriented k-times revocable-iff-linked group signatures. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 223-234. Springer, Heidelberg (2006)
    • Au, M.H., Susilo, W., Yiu, S.-M.: Event-oriented k-times revocable-iff-linked group signatures. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 223-234. Springer, Heidelberg (2006)
  • 9
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 10
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 14
    • 24944435537 scopus 로고    scopus 로고
    • Compact e-cash
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 15
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 16
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 17
    • 35248839965 scopus 로고    scopus 로고
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
  • 18
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups (extended abstract)
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups (extended abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 19
    • 35048855095 scopus 로고    scopus 로고
    • Secret handshakes from ca-oblivious encryption
    • Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
    • Castelluccia, C., Jarecki, S., Tsudik, G.: Secret handshakes from ca-oblivious encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293-307. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3329 , pp. 293-307
    • Castelluccia, C.1    Jarecki, S.2    Tsudik, G.3
  • 20
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199-203 (1982)
    • (1982) CRYPTO , pp. 199-203
    • Chaum, D.1
  • 21
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 22
    • 30044436588 scopus 로고    scopus 로고
    • Content availability, pollution and poisoning in file sharing peer-to-peer networks
    • ACM Press, New York
    • Christin, N., Weigend, A.S., Chuang, J.: Content availability, pollution and poisoning in file sharing peer-to-peer networks. In: ACM Conference on Electronic Commerce, pp. 68-77. ACM Press, New York (2005)
    • (2005) ACM Conference on Electronic Commerce , pp. 68-77
    • Christin, N.1    Weigend, A.S.2    Chuang, J.3
  • 23
    • 35048854233 scopus 로고    scopus 로고
    • Anonymous identification in ad hoc groups
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609-626. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 609-626
    • Dodis, Y.1    Kiayias, A.2    Nicolosi, A.3    Shoup, V.4
  • 24
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 26
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186-208 (1989)
    • (1989) SIAM J. Comput , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 27
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281-308 (1988)
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 28
    • 38049035427 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • LaMarca, A, Langheinrich, M, Truong, K.N, eds, Pervasive 2007, Springer, Heidelberg
    • Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127-143. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4480 , pp. 127-143
    • Krumm, J.1
  • 29
    • 26444607972 scopus 로고    scopus 로고
    • Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 318-333. Springer, Heidelberg (2005)
    • Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 318-333. Springer, Heidelberg (2005)
  • 31
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552-565. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 32
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 33
    • 35048839792 scopus 로고    scopus 로고
    • k-times anonymous authentication (extended abstract)
    • Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
    • Teranishi, I., Furukawa, J., Sako, K.: k-times anonymous authentication (extended abstract). In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 308-322. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3329 , pp. 308-322
    • Teranishi, I.1    Furukawa, J.2    Sako, K.3
  • 34
    • 33745871113 scopus 로고    scopus 로고
    • Teranishi, I., Sako, K.: k-times anonymous authentication with a constant proving cost. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 525-542. Springer, Heidelberg (2006)
    • Teranishi, I., Sako, K.: k-times anonymous authentication with a constant proving cost. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 525-542. Springer, Heidelberg (2006)
  • 35
    • 45749094170 scopus 로고    scopus 로고
    • TPM Work Group. TCG TPM Specification Version 1.2 Revision 103. Technical report, Trusted Computing Group (2007)
    • TPM Work Group. TCG TPM Specification Version 1.2 Revision 103. Technical report, Trusted Computing Group (2007)
  • 36
    • 45749119536 scopus 로고    scopus 로고
    • PPAA: Peer-to-peer anonymous authentication (extended version)
    • Technical Report TR2008-615, Department of Computer Science, Dartmouth College April
    • Tsang, P.P., Smith, S.W.: PPAA: Peer-to-peer anonymous authentication (extended version). Technical Report TR2008-615, Department of Computer Science, Dartmouth College (April 2008)
    • (2008)
    • Tsang, P.P.1    Smith, S.W.2
  • 37
    • 24644503853 scopus 로고    scopus 로고
    • Separable linkable threshold ring signatures
    • Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
    • Tsang, P.P., Wei, V.K., Chan, T.K., Au, M.H., Liu, J.K., Wong, D.S.: Separable linkable threshold ring signatures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 384-398. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3348 , pp. 384-398
    • Tsang, P.P.1    Wei, V.K.2    Chan, T.K.3    Au, M.H.4    Liu, J.K.5    Wong, D.S.6
  • 38
    • 49049098105 scopus 로고    scopus 로고
    • Tsudik, G., Xu, S.: A flexible framework for secret handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 295-315. Springer, Heidelberg (2006)
    • Tsudik, G., Xu, S.: A flexible framework for secret handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295-315. Springer, Heidelberg (2006)
  • 39
    • 35248831179 scopus 로고    scopus 로고
    • Captcha: Using hard ai problems for security
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294-311. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 294-311
    • von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4
  • 40
    • 14844289583 scopus 로고    scopus 로고
    • M.: K-anonymous secret handshakes with reusable credentials
    • ACM Press, New York
    • Xu, S., Yung, M.: k-anonymous secret handshakes with reusable credentials. In: ACM Conference on Computer and Communications Security, pp. 158-167. ACM Press, New York (2004)
    • (2004) ACM Conference on Computer and Communications Security , pp. 158-167
    • Xu, S.1    Yung2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.