메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2308-2313

A new direct anonymous attestation scheme from bilinear maps

Author keywords

Bilinear maps; Direct anonymous attestation; Trusted computing platform; Trusted platform module

Indexed keywords

BILINEAR MAPS; COMPUTATIONAL PERFORMANCES; DIFFIE-HELLMAN; DIRECT ANONYMOUS ATTESTATION; DIRECT ANONYMOUS ATTESTATIONS; PRACTICAL SOLUTIONS; PRIVATE KEYS; SECURITY REQUIREMENTS; TRUSTED COMPUTING GROUPS; TRUSTED COMPUTING PLATFORM; TRUSTED PLATFORM MODULE; UNFORGEABILITY; UNLINKABILITY;

EID: 58349115651     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICYCS.2008.396     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 3
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO '91, of, Springer Verlag
    • Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 129-140
    • Pryds Pedersen, T.1
  • 4
    • 35048847167 scopus 로고    scopus 로고
    • Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
    • Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
  • 6
    • 26444562547 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. E85-A(2), pp. 481-484, 2002.
    • (2002) IEICE Trans , vol.E85-A , Issue.2 , pp. 481-484
    • Miyaji, A.1    Masaki Nakabayashi, S.T.2
  • 7
    • 33749405352 scopus 로고    scopus 로고
    • Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer
    • Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer Computing 2005: 117-124
    • (2005) Computing , pp. 117-124
    • Balfe, S.1    Lakhani, A.D.2
  • 8
    • 38049042811 scopus 로고    scopus 로고
    • Tate: A Direct Anonymous Attestation Scheme for Embedded Devices
    • He Ge, Stephen R. Tate: A Direct Anonymous Attestation Scheme for Embedded Devices. Public Key Cryptography 2007: 16-30
    • (2007) Public Key Cryptography , pp. 16-30
    • Ge, H.1    Stephen, R.2
  • 10
    • 58349104351 scopus 로고    scopus 로고
    • Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive
    • Report 2007/194
    • Ernie Brickell,Jiangtao Li,Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive, Report 2007/194
    • Ernie Brickell, J.L.1
  • 11
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • B. Kaliski,editor, Advances in Cryptology, CRYPTO '97, of, SpringerVerlag
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski,editor, Advances in Cryptology - CRYPTO '97, volume 1296 of LNCS, pages 410-424. SpringerVerlag, 1997.
    • (1997) LNCS , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 12
    • 70350679379 scopus 로고    scopus 로고
    • National Security Agency, Accessed on April 11, 2006
    • National Security Agency. The Case for Elliptic Curve Cryptography, Accessed on April 11, 2006. http://www.nsa.gov/ia/industry/crypto-elliptic- curve.cfm.
    • The Case for Elliptic Curve Cryptography
  • 13
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces of FR-reduction
    • May
    • A.Miyaji,M.Nakabayashi, and S.Takano, " New explicit conditions of elliptic curve traces of FR-reduction" IEICE Trans.Fundamentals,vol.E84-A, no.5,pp. 1234-1243,May 2001.
    • (2001) IEICE Trans.Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 15
    • 33845516445 scopus 로고    scopus 로고
    • Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
    • Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.