메뉴 건너뛰기




Volumn 4258 LNCS, Issue , 2006, Pages 295-315

A flexible framework for secret handshakes: (Multi-party anonymous and un-observable authentication)

Author keywords

Anonymity; Credential systems; Key management; Privacy preservation; Secret handshakes; Unobservability

Indexed keywords

COMMUNICATION CHANNEL; CREDENTIAL SYSTEMS; CRYPTOGRAPHIC TECHNIQUES; FLEXIBLE FRAMEWORK; KEY MANAGEMENT; NATURAL EXTENSION; PAPER BREAK; PRIVACY PRESERVING; REUSABLE CREDENTIALS; SECRET HANDSHAKE; SECURITY ANALYSIS; STEP-BY-STEP; UNOBSERVABILITY; UNOBSERVABLE;

EID: 49049098105     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11957454_17     Document Type: Conference Paper
Times cited : (37)

References (36)
  • 1
    • 84921018856 scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • Proc. CRYPTO, Springer, 2000
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Proc. CRYPTO 2000, pages 255-270. Springer, 2000. Lecture Notes in Computer Science No. 1880.
    • (1880) Lecture Notes in Computer Science No , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 2
    • 77049110270 scopus 로고
    • Some Open Issues and New Directions in Group Signatures
    • Financial Cryptography'99
    • G. Ateniese and G. Tsudik. Some Open Issues and New Directions in Group Signatures. In Financial Cryptography'99. Lecture Notes in Computer Science No. 1880.
    • (1880) Lecture Notes in Computer Science No
    • Ateniese, G.1    Tsudik, G.2
  • 4
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • E. Biham, editor, Advances in Cryptology, EUROCRYPT 2003, of, Springer
    • M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614-629. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 5
    • 84873466407 scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Proc. EUROCRYPT, Springer, 2000
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. EUROCRYPT 2000, pages 139-155. Springer, 2000. Lecture Notes in Computer Science No. 1807.
    • (1807) Lecture Notes in Computer Science No , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 7
    • 77049087736 scopus 로고    scopus 로고
    • The case of dynamic groups. Cryptology ePrint Archive
    • M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures:, Report 2004/077
    • M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: The case of dynamic groups. Cryptology ePrint Archive, Report 2004/077, 2004. http://eprint.iacr.org/.
    • (2004)
  • 8
    • 77049083563 scopus 로고    scopus 로고
    • C. Boyd, W. Mao, and K. Paterson. Deniable authenticated key establishment for internet protocols
    • C. Boyd, W. Mao, and K. Paterson. Deniable authenticated key establishment for internet protocols.
  • 10
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic group Diffie-Hellman key exchange under standard assumptions
    • L. R. Knudsen, editor, Proc. of Eurocrypt 02, of
    • E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic group Diffie-Hellman key exchange under standard assumptions. In L. R. Knudsen, editor, Proc. of Eurocrypt 02, volume 2332 of LNCS, page 321-336.
    • LNCS , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • A. D. Santis, editor, Proc. EUROCRYPT, Springer, No. 950
    • M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In A. D. Santis, editor, Proc. EUROCRYPT 94, pages 275-286. Springer, 1994. Lecture Notes in Computer Science No. 950.
    • (1994) Lecture Notes in Computer Science , vol.94 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 12
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • M. Yung, editor, Proc. CRYPTO 2002, of
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In M. Yung, editor, Proc. CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 61-76.
    • Lecture Notes in Computer Science , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • B.S. Kaliski Jr, editor, Proc. CRYPTO 1997, of, Springer-Verlag
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B.S. Kaliski Jr., editor, Proc. CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 410-424. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 14
    • 35048855095 scopus 로고    scopus 로고
    • Secret handshakes from ca-oblivious encryption
    • Advances in Cryptology, ASIACRYPT 2004, of, Springer
    • C. Castelluccia, S. Jarecki, and G. Tsudik. Secret handshakes from ca-oblivious encryption. In Advances in Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 293-307. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 293-307
    • Castelluccia, C.1    Jarecki, S.2    Tsudik, G.3
  • 15
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84-88, Feb. 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 16
    • 0001604533 scopus 로고    scopus 로고
    • Blind signatures for untraceable payments
    • R. L. Rivest, A. Sherman, and D. Chaum, editors
    • D. Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 82, pages 199-203.
    • Proc. CRYPTO , vol.82 , pp. 199-203
    • Chaum, D.1
  • 17
    • 85024290278 scopus 로고
    • Group signatures
    • D.W. Davies, editor, Advances in Cryptology, Eurocrypt '91, Berlin, Springer-Verlag
    • D. Chaum and E. V. Heyst. Group signatures. In D.W. Davies, editor, Advances in Cryptology - Eurocrypt '91, pages 257-265, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science No. 547.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 257-265
    • Chaum, D.1    Heyst, E.V.2
  • 20
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • M. Fischer, N. Lynch, and M. Patterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM, 32(2):374-382, 1985.
    • (1985) Journal of the ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.1    Lynch, N.2    Patterson, M.3
  • 21
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • D. Boneh, editor, Proc. CRYPTO 2003, of, Springer-Verlag
    • J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. In D. Boneh, editor, Proc. CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 110-125. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 22
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, of, Springer
    • A. Kiayias, Y. Tsiounis, and M. Yung. Traceable signatures. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 571-589. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 23
    • 29244453439 scopus 로고    scopus 로고
    • Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive
    • Report 2004/076
    • A. Kiayias and M. Yung. Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076, 2004. http://eprint.iacr.org/.
    • (2004)
    • Kiayias, A.1    Yung, M.2
  • 24
    • 35248816546 scopus 로고    scopus 로고
    • Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols
    • D. Boneh, editor, Proc. CRYPTO 2003, of, Springer-Verlag
    • H. Krawczyk. Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols. In D. Boneh, editor, Proc. CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 400-425. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2729 , pp. 400-425
    • Krawczyk, H.1
  • 26
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • J. Kilian, editor, Proc. CRYPTO 2001, of, Springer-Verlag
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In J. Kilian, editor, Proc. CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 41-62. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 27
    • 79960836060 scopus 로고    scopus 로고
    • Deniable ring authentication
    • M. Yung, editor, Proc. CRYPTO 2002, of
    • M. Naor. Deniable ring authentication. In M. Yung, editor, Proc. CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 481-498. 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 481-498
    • Naor, M.1
  • 31
    • 8344270972 scopus 로고    scopus 로고
    • Securing dynamic membership information in multicast communications
    • Y. Sun and K. Liu. Securing dynamic membership information in multicast communications. In IEEE Infocom'04.
    • IEEE Infocom'04
    • Sun, Y.1    Liu, K.2
  • 32
    • 77049122923 scopus 로고    scopus 로고
    • G. Tsudik and S. Xu. A Flexible Framework for Secret Handshakes. Full version of the present paper available from the authors
    • G. Tsudik and S. Xu. A Flexible Framework for Secret Handshakes. Full version of the present paper (available from the authors).
  • 34
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communication using key graphs
    • Preliminary version in SIGCOMM'98, 8
    • C. Wong, M. Gouda, and S. Lam. Secure group communication using key graphs. IEEE/ACM Transactions on Networking (Preliminary version in SIGCOMM'98), 8, 2000.
    • (2000) IEEE/ACM Transactions on Networking
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 36
    • 14844289583 scopus 로고    scopus 로고
    • S. Xu and M. Yung. k-anonymous secret handshakes with reusable credentials. In Proceedings of the 11th ACM conference on Computer and communications security (CCS'04), pages 158-167. ACM Press, 2004.
    • S. Xu and M. Yung. k-anonymous secret handshakes with reusable credentials. In Proceedings of the 11th ACM conference on Computer and communications security (CCS'04), pages 158-167. ACM Press, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.