메뉴 건너뛰기




Volumn 4968 LNCS, Issue , 2008, Pages 166-178

A new direct anonymous attestation scheme from bilinear maps

Author keywords

Bilinear map; Direct anonymous attestation; Elliptic curve cryptography; The Camenisch Lysyanskaya signature scheme; Trusted platform module

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; INFORMATION TECHNOLOGY; OPTICAL PROJECTORS;

EID: 52149103884     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68979-9_13     Document Type: Conference Paper
Times cited : (106)

References (30)
  • 1
    • 54249146366 scopus 로고    scopus 로고
    • Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestaion protocol. Cryptology ePrint Archive
    • Report 2007/289
    • Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestaion protocol. Cryptology ePrint Archive, Report 2007/289 (2007), http://eprint.iacr.org/
    • (2007)
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 2
    • 85013594843 scopus 로고    scopus 로고
    • Securing peer-to-peer networks using trusted computing
    • Mitchell, C, ed, ch.10, pp, IEE, London
    • Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using trusted computing. In: Mitchell, C. (ed.) Trusted Computing, ch.10, pp. 271-298. IEE, London (2005)
    • (2005) Trusted Computing , pp. 271-298
    • Balfe, S.1    Lakhani, A.D.2    Paterson, K.G.3
  • 3
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 85013604515 scopus 로고    scopus 로고
    • Direct anonymous attestation in context
    • Mitchell, C, ed, ch.5, pp, IEE, London
    • Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation in context. In: Mitchell, C. (ed.) Trusted Computing, ch.5, pp. 143-174. IEE, London (2005)
    • (2005) Trusted Computing , pp. 143-174
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 8
    • 84949198248 scopus 로고
    • Gradual and verifiable release of a secret
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Brickell, E., Chaum, D., Damgård, I., van de Graaf, J.: Gradual and verifiable release of a secret. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 156-166. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 156-166
    • Brickell, E.1    Chaum, D.2    Damgård, I.3    van de Graaf, J.4
  • 9
    • 23944501377 scopus 로고    scopus 로고
    • Camenisch, J., Groth, J.: Group signatures: Better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 120-133, Springer, Heidelberg (2005)
    • Camenisch, J., Groth, J.: Group signatures: Better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 120-133, Springer, Heidelberg (2005)
  • 10
    • 35248839965 scopus 로고    scopus 로고
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289, Springer, Heidelberg (2003)
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289, Springer, Heidelberg (2003)
  • 11
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • CAIP, Springer, Heidelberg
    • Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: CAIP 1997. LNCS, vol. 1296, pp. 410-424, Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 13
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 14
    • 85043778396 scopus 로고
    • Zero-knowledge undeniable signatures
    • Damgård, I.B, ed, EUROCRYPT 1990, Springer, Heidelberg
    • Chaum, D.: Zero-knowledge undeniable signatures. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 458-464, Springer, Heidelberg (1991)
    • (1991) LNCS , vol.473 , pp. 458-464
    • Chaum, D.1
  • 15
    • 85023982750 scopus 로고
    • An improved protocol for demonstrating possession of discrete logarithms and some generalizations
    • Price, W.L, Chaum, D, eds, EUROCRYPT 1987, Springer, Heidelberg
    • Chaum, D., Evertse, J.-H., van de Graaf, J.: An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 127-141, Springer, Heidelberg (1988)
    • (1988) LNCS , vol.304 , pp. 127-141
    • Chaum, D.1    Evertse, J.-H.2    van de Graaf, J.3
  • 16
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194, Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 18
    • 38049042811 scopus 로고    scopus 로고
    • Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 16-30, Springer, Heidelberg (2007)
    • Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 16-30, Springer, Heidelberg (2007)
  • 19
    • 38149073252 scopus 로고    scopus 로고
    • Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, 4717, pp. 73-90, Springer, Heidelberg (2007)
    • Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 73-90, Springer, Heidelberg (2007)
  • 20
    • 54249121607 scopus 로고    scopus 로고
    • On the implementation of pairing-based cryptosystems
    • PhD thesis, Stanford University, Stanford, California 2007
    • Lynn, B.: On the implementation of pairing-based cryptosystems. PhD thesis, Stanford University, Stanford, California (2007)
    • Lynn, B.1
  • 21
    • 67651053584 scopus 로고    scopus 로고
    • Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 184-199, Springer, Heidelberg (2000)
    • Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199, Springer, Heidelberg (2000)
  • 23
    • 85013568909 scopus 로고    scopus 로고
    • Single sign-on using TCG-conformant platforms
    • Mitchell, C, ed, ch. 6, pp, IEE, London
    • Pashalidis, A., Mitchell, C.J.: Single sign-on using TCG-conformant platforms. In: Mitchell, C. (ed.) Trusted Computing, ch. 6, pp. 175-193. IEE, London (2005)
    • (2005) Trusted Computing , pp. 175-193
    • Pashalidis, A.1    Mitchell, C.J.2
  • 24
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE Computer Society Press, Los Alamitos
    • Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 184-200. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proceedings of the IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 25
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387-398. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 27
    • 12344258539 scopus 로고
    • Efficient identification and signatures for smart cards
    • Schnorr, C.P.: Efficient identification and signatures for smart cards. Journal of Cryptology 4(3), 161-174 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 28
    • 38149070279 scopus 로고    scopus 로고
    • Smyth, B., Chen, L., Ryan, M.: Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators. In: Stajano, F. (ed.) ESAS 2007. LNCS, 4572, pp. 218-231, Springer, Heidelberg (2007)
    • Smyth, B., Chen, L., Ryan, M.: Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators. In: Stajano, F. (ed.) ESAS 2007. LNCS, vol. 4572, pp. 218-231, Springer, Heidelberg (2007)
  • 29
    • 14844325627 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group. TCG TPM specification 1.2 (2003), http://www.trustedcomputinggroup.org
    • (2003) TCG TPM specification 1.2
  • 30
    • 54249133340 scopus 로고    scopus 로고
    • Trusted Computing Group website
    • Trusted Computing Group website, http://www.trustedcomputinggroup.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.