메뉴 건너뛰기




Volumn 5209 LNCS, Issue , 2008, Pages 1-17

Pairings in trusted computing

Author keywords

[No Author keywords available]

Indexed keywords

STANDARDS;

EID: 52149086372     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85538-5_1     Document Type: Conference Paper
Times cited : (72)

References (21)
  • 1
    • 33745604534 scopus 로고    scopus 로고
    • Barreto, P.S.L.M., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 319-331. Springer, Heidelberg (2006)
    • Barreto, P.S.L.M., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319-331. Springer, Heidelberg (2006)
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 84863941015 scopus 로고    scopus 로고
    • Simplified security notions for direct anonymous attestation and a concrete scheme from pairings. Cryptology ePrint Archive
    • Report 2008/104
    • Brickell, E., Chen, L., Li, J.: Simplified security notions for direct anonymous attestation and a concrete scheme from pairings. Cryptology ePrint Archive. Report 2008/104, http://eprint.iacr.org/2008/104
    • Brickell, E.1    Chen, L.2    Li, J.3
  • 9
    • 52149103884 scopus 로고    scopus 로고
    • A new direct anonymous attestation scheme from bilinear maps
    • Proceedings Trust, Springer, Heidelberg to appear
    • Brickell, E., Chen, L., Li, J.: A new direct anonymous attestation scheme from bilinear maps. In: Proceedings Trust 2008. LNCS, vol. 4968, pp. 166-178. Springer, Heidelberg (to appear, 2008)
    • (2008) LNCS , vol.4968 , pp. 166-178
    • Brickell, E.1    Chen, L.2    Li, J.3
  • 10
    • 35248839965 scopus 로고    scopus 로고
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
  • 11
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 52149086869 scopus 로고    scopus 로고
    • Camenisch, J., Michels, M.: A group signature scheme based on an RSA-variant. Technical Report RS-98-27, BRICS, University of Aarhus (1998)
    • Camenisch, J., Michels, M.: A group signature scheme based on an RSA-variant. Technical Report RS-98-27, BRICS, University of Aarhus (1998)
  • 13
    • 33645735382 scopus 로고    scopus 로고
    • An efficient ID-KEM based on the Sakai-Kasahara key construction
    • Information Security
    • Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.P.: An efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings, Information Security 153, 19-26 (2006)
    • (2006) IEE Proceedings , vol.153 , pp. 19-26
    • Chen, L.1    Cheng, Z.2    Malone-Lee, J.3    Smart, N.P.4
  • 16
    • 38049042811 scopus 로고    scopus 로고
    • Ge, H., Tate, S.R.: A Direct Anonymous Attestation Scheme for Embedded Devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450. Springer, Heidelberg (2007)
    • Ge, H., Tate, S.R.: A Direct Anonymous Attestation Scheme for Embedded Devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450. Springer, Heidelberg (2007)
  • 17
    • 67651053584 scopus 로고    scopus 로고
    • Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 184-199. Springer, Heidelberg (2000)
    • Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
  • 20
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39, 1639-1646 (1993)
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.A.3
  • 21
    • 52149102130 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group, http://www.trustedcomputinggroup.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.