메뉴 건너뛰기




Volumn 5185 LNCS, Issue , 2008, Pages 185-194

A user-centric protocol for conditional anonymity revocation

Author keywords

Anonymity revocation; Privacy; User centric identity

Indexed keywords

DIGITAL ARITHMETIC;

EID: 52149088094     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85735-8_18     Document Type: Conference Paper
Times cited : (7)

References (10)
  • 1
    • 33749661564 scopus 로고    scopus 로고
    • A cryptographic framework for the controlled release of certified data
    • Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2004, Springer, Heidelberg
    • Bangerter, E., Camenisch, J., Lysyanskaya, A.: A cryptographic framework for the controlled release of certified data. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 20-42. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3957 , pp. 20-42
    • Bangerter, E.1    Camenisch, J.2    Lysyanskaya, A.3
  • 2
    • 33845547238 scopus 로고    scopus 로고
    • Camenisch, J., Sommer, D., Zimmermann, R.: A general certification framework with applications to privacy-enhancing certificate infrastructures. In: Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.) SEC. IFIP, 201, pp. 25-37. Springer, Heidelberg (2006)
    • Camenisch, J., Sommer, D., Zimmermann, R.: A general certification framework with applications to privacy-enhancing certificate infrastructures. In: Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.) SEC. IFIP, vol. 201, pp. 25-37. Springer, Heidelberg (2006)
  • 3
    • 52149122432 scopus 로고    scopus 로고
    • Brands, S.: Identity: Setting the larger context, achieving the right outcomes. In: 7th Annual Privacy and Security Workshop & 15th CACR Information Security Workshop (November 2006)
    • Brands, S.: Identity: Setting the larger context, achieving the right outcomes. In: 7th Annual Privacy and Security Workshop & 15th CACR Information Security Workshop (November 2006)
  • 4
    • 33745853424 scopus 로고    scopus 로고
    • Universal custodian-hiding verifiable encryption for discrete logarithms
    • Won, D.H, Kim, S, eds, ICISC 2005, Springer, Heidelberg
    • Liu, J.K., Tsang, P.P., Wong, D.S., Zhu, R.W.: Universal custodian-hiding verifiable encryption for discrete logarithms. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 389-409. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 389-409
    • Liu, J.K.1    Tsang, P.P.2    Wong, D.S.3    Zhu, R.W.4
  • 5
    • 0030709601 scopus 로고    scopus 로고
    • Verifiable partial key escrow
    • ACM, New York
    • Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: 4th ACM CCS, pp. 78-91. ACM, New York (1997)
    • (1997) 4th ACM CCS , pp. 78-91
    • Bellare, M.1    Goldwasser, S.2
  • 6
    • 34547404349 scopus 로고    scopus 로고
    • Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: a taxonomy and open issues. In: Juels, A., Winslett, M., Goto, A. (eds.) DIM, pp. 1-10. ACM, New York (2006)
    • Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: a taxonomy and open issues. In: Juels, A., Winslett, M., Goto, A. (eds.) DIM, pp. 1-10. ACM, New York (2006)
  • 7
    • 35248839965 scopus 로고    scopus 로고
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
  • 8
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 9
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 52149094705 scopus 로고    scopus 로고
    • A user-centric protocol for conditional anonymity revocation
    • Technical Report 13123, Queensland University of Technology March
    • Suriadi, S., Foo, E., Smith, J.: A user-centric protocol for conditional anonymity revocation. Technical Report 13123, Queensland University of Technology (March 2008), http://eprints.qut.edu.au/archive/00013123/
    • (2008)
    • Suriadi, S.1    Foo, E.2    Smith, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.