-
1
-
-
54249146366
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestaion protocol. Cryptology ePrint Archive
-
Report 2007/289
-
Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestaion protocol. Cryptology ePrint Archive, Report 2007/289 (2007), http://eprint.iacr.org/
-
(2007)
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
2
-
-
85013594843
-
Securing peer-to-peer networks using trusted computing
-
Mitchell, C, ed, ch.10, pp, IEE, London
-
Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using trusted computing. In: Mitchell, C. (ed.) Trusted Computing, ch.10, pp. 271-298. IEE, London (2005)
-
(2005)
Trusted Computing
, pp. 271-298
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
3
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
4
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132-145. ACM Press, New York (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
7
-
-
85013604515
-
Direct anonymous attestation in context
-
Mitchell, C, ed, ch.5, pp, IEE, London
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation in context. In: Mitchell, C. (ed.) Trusted Computing, ch.5, pp. 143-174. IEE, London (2005)
-
(2005)
Trusted Computing
, pp. 143-174
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
8
-
-
84949198248
-
Gradual and verifiable release of a secret
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Brickell, E., Chaum, D., Damgård, I., van de Graaf, J.: Gradual and verifiable release of a secret. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 156-166. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 156-166
-
-
Brickell, E.1
Chaum, D.2
Damgård, I.3
van de Graaf, J.4
-
9
-
-
23944501377
-
-
Camenisch, J., Groth, J.: Group signatures: Better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 120-133, Springer, Heidelberg (2005)
-
Camenisch, J., Groth, J.: Group signatures: Better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 120-133, Springer, Heidelberg (2005)
-
-
-
-
10
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289, Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289, Springer, Heidelberg (2003)
-
-
-
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
84958612917
-
Efficient group signature schemes for large groups
-
CAIP, Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: CAIP 1997. LNCS, vol. 1296, pp. 410-424, Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
13
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
14
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
Damgård, I.B, ed, EUROCRYPT 1990, Springer, Heidelberg
-
Chaum, D.: Zero-knowledge undeniable signatures. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 458-464, Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.473
, pp. 458-464
-
-
Chaum, D.1
-
15
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
-
Price, W.L, Chaum, D, eds, EUROCRYPT 1987, Springer, Heidelberg
-
Chaum, D., Evertse, J.-H., van de Graaf, J.: An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 127-141, Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.304
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.-H.2
van de Graaf, J.3
-
16
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194, Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
82955246861
-
Implementing the Tate pairing
-
London, UK, pp, Springer, London
-
Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Proceedings of the 5th International Symposium on Algorithmic Number Theory, London, UK, pp. 324-337, Springer, London (2002)
-
(2002)
Proceedings of the 5th International Symposium on Algorithmic Number Theory
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
18
-
-
38049042811
-
-
Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 16-30, Springer, Heidelberg (2007)
-
Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 16-30, Springer, Heidelberg (2007)
-
-
-
-
19
-
-
38149073252
-
-
Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, 4717, pp. 73-90, Springer, Heidelberg (2007)
-
Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 73-90, Springer, Heidelberg (2007)
-
-
-
-
20
-
-
54249121607
-
On the implementation of pairing-based cryptosystems
-
PhD thesis, Stanford University, Stanford, California 2007
-
Lynn, B.: On the implementation of pairing-based cryptosystems. PhD thesis, Stanford University, Stanford, California (2007)
-
-
-
Lynn, B.1
-
21
-
-
67651053584
-
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 184-199, Springer, Heidelberg (2000)
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199, Springer, Heidelberg (2000)
-
-
-
-
22
-
-
85030330304
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
ACM Press, New York
-
Menezes, A., Vanstone, S., Okamoto, T.: Reducing elliptic curve logarithms to logarithms in a finite field. In: Proceedings of the 23rd annual ACM Symposium on Theory of Computing (STOC), pp. 80-89. ACM Press, New York (1991)
-
(1991)
Proceedings of the 23rd annual ACM Symposium on Theory of Computing (STOC)
, pp. 80-89
-
-
Menezes, A.1
Vanstone, S.2
Okamoto, T.3
-
23
-
-
85013568909
-
Single sign-on using TCG-conformant platforms
-
Mitchell, C, ed, ch. 6, pp, IEE, London
-
Pashalidis, A., Mitchell, C.J.: Single sign-on using TCG-conformant platforms. In: Mitchell, C. (ed.) Trusted Computing, ch. 6, pp. 175-193. IEE, London (2005)
-
(2005)
Trusted Computing
, pp. 175-193
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
24
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE Computer Society Press, Los Alamitos
-
Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 184-200. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
25
-
-
84927727752
-
Security proofs for signature schemes
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387-398. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
27
-
-
12344258539
-
Efficient identification and signatures for smart cards
-
Schnorr, C.P.: Efficient identification and signatures for smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
28
-
-
38149070279
-
-
Smyth, B., Chen, L., Ryan, M.: Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators. In: Stajano, F. (ed.) ESAS 2007. LNCS, 4572, pp. 218-231, Springer, Heidelberg (2007)
-
Smyth, B., Chen, L., Ryan, M.: Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators. In: Stajano, F. (ed.) ESAS 2007. LNCS, vol. 4572, pp. 218-231, Springer, Heidelberg (2007)
-
-
-
-
29
-
-
14844325627
-
-
Trusted Computing Group
-
Trusted Computing Group. TCG TPM specification 1.2 (2003), http://www.trustedcomputinggroup.org
-
(2003)
TCG TPM specification 1.2
-
-
-
30
-
-
54249133340
-
-
Trusted Computing Group website
-
Trusted Computing Group website, http://www.trustedcomputinggroup.org
-
-
-
|