메뉴 건너뛰기




Volumn 5126 LNCS, Issue PART 2, 2008, Pages 715-726

Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; LINGUISTICS; MAPS; TRANSLATION (LANGUAGES);

EID: 49049101312     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70583-3_58     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 2
    • 38049087403 scopus 로고    scopus 로고
    • Privacy in encrypted content distribution using private broadcast encryption
    • Barth, A., Boneh, D., Waters, B.: Privacy in encrypted content distribution using private broadcast encryption. In: Proceedings of Financial Cryptography 2006 (2006)
    • (2006) Proceedings of Financial Cryptography
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 3
    • 84946837370 scopus 로고    scopus 로고
    • Key-privacy in public-key encryption
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 4
    • 80052994578 scopus 로고    scopus 로고
    • Multi-recipient encryption schemes: Security notions and randomness re-use
    • Bellare, M., Boldyreva, A., Staddon, J.:Multi-recipient encryption schemes: Security notions and randomness re-use. In: PKC 2003 (2003)
    • (2003) PKC
    • Bellare, M.1    Boldyreva, A.2    Staddon, J.3
  • 6
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976
    • Bellare, M.1    Namprempre, C.2
  • 8
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 35048855095 scopus 로고    scopus 로고
    • Secret handshakes from CA-oblivious encryption
    • Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
    • Castelluccia, C., Jarecki, S., Tsudik, G.: Secret handshakes from CA-oblivious encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3329
    • Castelluccia, C.1    Jarecki, S.2    Tsudik, G.3
  • 10
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547
    • Chaum, D.1    van Heyst, E.2
  • 11
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666
    • Fujisaki, E.1    Okamoto, T.2
  • 13
    • 49049086101 scopus 로고    scopus 로고
    • Jarecki, S., Kim, J., Tsudik, G.: Authenticated group key agreement protocols with the privacy property of affiliation-hiding. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377. Springer, Heidelberg (2006)
    • Jarecki, S., Kim, J., Tsudik, G.: Authenticated group key agreement protocols with the privacy property of affiliation-hiding. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377. Springer, Heidelberg (2006)
  • 14
    • 49049118691 scopus 로고    scopus 로고
    • Beyond secret handshakes: Affiliation-hiding authenticated key exchange
    • Jarecki, S., Kim, J., Tsudik, G.: Beyond secret handshakes: Affiliation-hiding authenticated key exchange. In: Proceedings of CT-RSA (2008)
    • (2008) Proceedings of CT-RSA
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 15
    • 38049060325 scopus 로고    scopus 로고
    • Jarecki, S., Liu, X.: Unlinkable secret handshakes and key-private group key management schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521. Springer, Heidelberg (2007)
    • Jarecki, S., Liu, X.: Unlinkable secret handshakes and key-private group key management schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521. Springer, Heidelberg (2007)
  • 17
    • 49049098706 scopus 로고    scopus 로고
    • Jarecki, S., Liu, X.: Private conditional oblivious transfer and unlinkable secret handshakes (in submission, 2008)
    • Jarecki, S., Liu, X.: Private conditional oblivious transfer and unlinkable secret handshakes (in submission, 2008)
  • 18
    • 84974720881 scopus 로고    scopus 로고
    • Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978. Springer, Heidelberg (2001)
    • Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978. Springer, Heidelberg (2001)
  • 19
    • 84957649548 scopus 로고    scopus 로고
    • Identity escrow
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Kilian, J., Petrank, E.: Identity escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462
    • Kilian, J.1    Petrank, E.2
  • 20
    • 49049098105 scopus 로고    scopus 로고
    • A flexible framework for secret handshakes
    • Tsudik, G., Xu, S.: A flexible framework for secret handshakes. In: Privacy Enhancing Technologies 2006, pp. 295-315 (2006)
    • (2006) Privacy Enhancing Technologies , pp. 295-315
    • Tsudik, G.1    Xu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.