메뉴 건너뛰기




Volumn 12, Issue 3, 2009, Pages

Compact and anonymous role-based authorization chain

Author keywords

Aggregate signature; Anonymity; Delegation

Indexed keywords

AGGREGATE SIGNATURE; ANONYMITY; COMMUNICATION BANDWIDTHS; COMPACT ROLES; DELEGATION; DELEGATOR; DIGITAL SIGNATURE SCHEMES; INTERNAL STRUCTURES; MEMBERSHIP INFORMATIONS; MOBILE COMPUTING DEVICES; ROLE-BASED; STORAGE UNITS; TRANSMISSION MECHANISMS; UBIQUITOUS COMPUTING ENVIRONMENTS;

EID: 60349114116     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1455526.1455528     Document Type: Article
Times cited : (13)

References (51)
  • 2
    • 33846235192 scopus 로고    scopus 로고
    • ARINGHIEEI, R., DAMIANI, E., DE CAPITANI dI VIMERCATI, S., AND SAMAEATI, P. 2005. Assessing efficiency of trust management in peer-to-peer systems. In Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS'05).
    • ARINGHIEEI, R., DAMIANI, E., DE CAPITANI dI VIMERCATI, S., AND SAMAEATI, P. 2005. Assessing efficiency of trust management in peer-to-peer systems. In Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS'05).
  • 3
    • 84921018856 scopus 로고    scopus 로고
    • ATENIESE, G., CAMENISCH, J., JOYE, M., AND TSUDIK, G. 2000. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of the Annual International Cryptology Conference (CRYPTO'00). Lecture Notes in Computer Science, 1880. Springer Verlag, 255-270.
    • ATENIESE, G., CAMENISCH, J., JOYE, M., AND TSUDIK, G. 2000. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of the Annual International Cryptology Conference (CRYPTO'00). Lecture Notes in Computer Science, vol. 1880. Springer Verlag, 255-270.
  • 4
    • 84982994153 scopus 로고    scopus 로고
    • Distributed access-rights management with delegation certificates
    • Secure Internet Programming-Security Issues for Distributed and Mobile Objects, Springer
    • AUEA, T. 1999. Distributed access-rights management with delegation certificates. In Secure Internet Programming-Security Issues for Distributed and Mobile Objects. Lecture Notes in Computer Science, vol. 1603. Springer, 211-235.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 211-235
    • AUEA, T.1
  • 5
    • 84954406641 scopus 로고    scopus 로고
    • BALFANZ, D., DURFEE, G., SHANKAR, N., SMETTERS, D., STADDON, J., AND WONG, H. 2003. Secret handshakes from pairing-based key agreements. In Proceedings of the IEEE Symposium on Security and Privacy (SP'03). IEEE Press. 180-196.
    • BALFANZ, D., DURFEE, G., SHANKAR, N., SMETTERS, D., STADDON, J., AND WONG, H. 2003. Secret handshakes from pairing-based key agreements. In Proceedings of the IEEE Symposium on Security and Privacy (SP'03). IEEE Press. 180-196.
  • 6
    • 84937428623 scopus 로고    scopus 로고
    • BAEEETO, P. S., KIM, H. Y., LYNN, B., AND SCOTT, M. 2002. Efficient algorithms for pairingbased cryptosystems. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, 2442. Springer-Verlag, 354-368.
    • BAEEETO, P. S., KIM, H. Y., LYNN, B., AND SCOTT, M. 2002. Efficient algorithms for pairingbased cryptosystems. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, vol. 2442. Springer-Verlag, 354-368.
  • 7
    • 35248843604 scopus 로고    scopus 로고
    • BELLAEE, M., MICCIANCIO, D., AND WARINSCHI, B. 2003. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). Lecture Notes in Computer Science, 2656. 614-629.
    • BELLAEE, M., MICCIANCIO, D., AND WARINSCHI, B. 2003. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). Lecture Notes in Computer Science, vol. 2656. 614-629.
  • 10
    • 60349125449 scopus 로고    scopus 로고
    • BONEH, D., BOYEN, X., AND SHACHAM, H. 2004. Short group signatures. In Proceedings of the Annual International Cryptology Conference (CRYPTO'04). Lecture Notes in Computer Science.
    • BONEH, D., BOYEN, X., AND SHACHAM, H. 2004. Short group signatures. In Proceedings of the Annual International Cryptology Conference (CRYPTO'04). Lecture Notes in Computer Science.
  • 11
    • 84874324906 scopus 로고    scopus 로고
    • BONEH, D. AND FRANKLIN, M. 2001a. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, 2139. Springer, 213-229.
    • BONEH, D. AND FRANKLIN, M. 2001a. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, vol. 2139. Springer, 213-229.
  • 12
    • 84874324906 scopus 로고    scopus 로고
    • BONEH, D. AND FRANKLIN, M. K. 2001b. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, 2139. Springer, 213-229.
    • BONEH, D. AND FRANKLIN, M. K. 2001b. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, vol. 2139. Springer, 213-229.
  • 13
    • 35248835575 scopus 로고    scopus 로고
    • BONEH, D., GENTEY, C., LYNN, B., AND SHACHAM, H. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). 416-432.
    • BONEH, D., GENTEY, C., LYNN, B., AND SHACHAM, H. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). 416-432.
  • 15
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Advances in Cryptology ASIACRYPT'01, Springer-Verlag
    • BONEH, D., LYNN, B., AND SHACHAM, H. 2001. Short signatures from the Weil pairing. In Advances in Cryptology (ASIACRYPT'01). Lecture Notes in Computer Science, vol. 2248. Springer-Verlag, 514-523.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 514-523
    • BONEH, D.1    LYNN, B.2    SHACHAM, H.3
  • 17
    • 84945135810 scopus 로고    scopus 로고
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'01), B. Pfitzmann, ed. Lecture Notes in Computer Science, 2045. Springer Verlag, 93-118.
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'01), B. Pfitzmann, ed. Lecture Notes in Computer Science, vol. 2045. Springer Verlag, 93-118.
  • 18
    • 84937428748 scopus 로고    scopus 로고
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, 2442. 61-76.
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, vol. 2442. 61-76.
  • 20
    • 84958612917 scopus 로고    scopus 로고
    • CAMENISCH, J. AND STADLER, M. 1997. Efficient group signature schemes for large groups. In Proceedings of the Annual International Cryptology Conference (CRYPTO'97). Lecture Notes in Computer Science, 1296. Springer-Verlag, 410-424.
    • CAMENISCH, J. AND STADLER, M. 1997. Efficient group signature schemes for large groups. In Proceedings of the Annual International Cryptology Conference (CRYPTO'97). Lecture Notes in Computer Science, vol. 1296. Springer-Verlag, 410-424.
  • 21
    • 0038687775 scopus 로고    scopus 로고
    • CAMENISCH, J. AND VAN HERREWEGHEN, E. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). 21-30.
    • CAMENISCH, J. AND VAN HERREWEGHEN, E. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). 21-30.
  • 22
    • 33749578123 scopus 로고    scopus 로고
    • CHASE, M. AND LYSYANSKAYA, A. 2006. On signatures of knowledge. In Proceedings of the Annual International Cryptology Conference (CRYPTO'06). Lecture Notes in Computer Science, 4117. Springer, 78-96.
    • CHASE, M. AND LYSYANSKAYA, A. 2006. On signatures of knowledge. In Proceedings of the Annual International Cryptology Conference (CRYPTO'06). Lecture Notes in Computer Science, vol. 4117. Springer, 78-96.
  • 23
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • CHAUM, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Comm. ACM 28, 10, 1030-1044.
    • (1985) Comm. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • CHAUM, D.1
  • 26
    • 60349130018 scopus 로고    scopus 로고
    • CHEN, X., ZHANG, F., AND KIM, K. 2003. A new ID-based group signature scheme from bilinear pairings. In Proceedings of the International Workshop on Information Security Applications (WISA'03). K. Chae and M. Yung eds. Lecture Notes in Computer Science, 2908. Springer, 585-592.
    • CHEN, X., ZHANG, F., AND KIM, K. 2003. A new ID-based group signature scheme from bilinear pairings. In Proceedings of the International Workshop on Information Security Applications (WISA'03). K. Chae and M. Yung eds. Lecture Notes in Computer Science, vol. 2908. Springer, 585-592.
  • 32
    • 21144440101 scopus 로고    scopus 로고
    • GOODEICH, M. T., SHIN, M., TAMASSIA, R., AND WINSBOEOUGH, W. H. 2003. Authenticated dictionaries for fresh attribute credentials. In Proceedings of the Trust Management Conference (TRUST03). Lecture Notes in Computer Science, 2692. Springer, 332-347.
    • GOODEICH, M. T., SHIN, M., TAMASSIA, R., AND WINSBOEOUGH, W. H. 2003. Authenticated dictionaries for fresh attribute credentials. In Proceedings of the Trust Management Conference (TRUST03). Lecture Notes in Computer Science, vol. 2692. Springer, 332-347.
  • 34
    • 60349093086 scopus 로고    scopus 로고
    • JUELS, A. 1999. Trustee tokens: Simple and practical tracing of anonymous digital cash. In Proceedings of the 3rd International Conference on Financial Cryptography (FC'99). Lecture Notes in Computer Science, 1648. Springer-Verlag, 33-43.
    • JUELS, A. 1999. Trustee tokens: Simple and practical tracing of anonymous digital cash. In Proceedings of the 3rd International Conference on Financial Cryptography (FC'99). Lecture Notes in Computer Science, vol. 1648. Springer-Verlag, 33-43.
  • 35
    • 0041524661 scopus 로고    scopus 로고
    • Delegation Logic: A logic-based approach to distributed authorization
    • LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003. Delegation Logic: A logic-based approach to distributed authorization. ACM Trans. Inform. Syst. Secur. 6, 1, 128-171.
    • (2003) ACM Trans. Inform. Syst. Secur , vol.6 , Issue.1 , pp. 128-171
    • LI, N.1    GROSOF, B.N.2    FEIGENBAUM, J.3
  • 37
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed credential chain discovery in trust management. J. Comput. Secur. 11, 1, 35-86.
    • (2003) J. Comput. Secur , vol.11 , Issue.1 , pp. 35-86
    • LI, N.1    WINSBOROUGH, W.H.2    MITCHELL, J.C.3
  • 38
    • 35048877778 scopus 로고    scopus 로고
    • LYSYANSKAYA, A., MICALI, S., REYZIN, L., AND SHACHAM, H. 2004. Sequential aggregate signatures from trapdoor permutations. In Proceedings of Advances in Cryptology (EUROCRYPT'04). Lecture Notes in Computer Science, 3027. Springer-Verlag, 74-90.
    • LYSYANSKAYA, A., MICALI, S., REYZIN, L., AND SHACHAM, H. 2004. Sequential aggregate signatures from trapdoor permutations. In Proceedings of Advances in Cryptology (EUROCRYPT'04). Lecture Notes in Computer Science, vol. 3027. Springer-Verlag, 74-90.
  • 40
    • 84937389342 scopus 로고    scopus 로고
    • OKAMOTO, T. AND POINTCHEVAL, D. 2001. The gap-problems: A new class of problems for the security of cryptographic schemes. In Proceedings of the International Conference on Theory and Public-Key Cryptography (PKC'01). Lecture Notes in Computer Science, 1992. Springer-Verlag, 104-118.
    • OKAMOTO, T. AND POINTCHEVAL, D. 2001. The gap-problems: A new class of problems for the security of cryptographic schemes. In Proceedings of the International Conference on Theory and Public-Key Cryptography (PKC'01). Lecture Notes in Computer Science, vol. 1992. Springer-Verlag, 104-118.
  • 41
    • 33751100921 scopus 로고    scopus 로고
    • PALLICKAEA, S. L., PLALE, B., FANG, L., AND GANNON, D. 2006. End-to-end trustworthy data access in data-oriented scientific computing. In Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'06). 395-400.
    • PALLICKAEA, S. L., PLALE, B., FANG, L., AND GANNON, D. 2006. End-to-end trustworthy data access in data-oriented scientific computing. In Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'06). 395-400.
  • 42
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • SANDHU, R. S. 1993. Lattice-based access control models. IEEE Comput. 26, 11, 9-19.
    • (1993) IEEE Comput , vol.26 , Issue.11 , pp. 9-19
    • SANDHU, R.S.1
  • 44
    • 85020598353 scopus 로고    scopus 로고
    • SHAMIR, A. 1984. Identity-based cryptosystems and signature schemes. In Proceedings of the Annual International Cryptology Conference (CRYPTO'84). Lecture Notes in Computer Science, 196. Springer, 47-53.
    • SHAMIR, A. 1984. Identity-based cryptosystems and signature schemes. In Proceedings of the Annual International Cryptology Conference (CRYPTO'84). Lecture Notes in Computer Science, vol. 196. Springer, 47-53.
  • 48
    • 14844297376 scopus 로고    scopus 로고
    • YAO, D., FAZIO, N., DODIS, Y., AND LYSYANSKAYA, A. 2004. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'04). ACM Press, 354-363.
    • YAO, D., FAZIO, N., DODIS, Y., AND LYSYANSKAYA, A. 2004. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'04). ACM Press, 354-363.
  • 50
    • 33845964139 scopus 로고    scopus 로고
    • YAO, D., TAMASSIA, R., AND PROCTOR, S. 2005. On improving the performance of role-based cascaded delegation in ubiquitous computing. In Proceedings of the IEEE / Create Net Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05). IEEE Press, 157-168.
    • YAO, D., TAMASSIA, R., AND PROCTOR, S. 2005. On improving the performance of role-based cascaded delegation in ubiquitous computing. In Proceedings of the IEEE / Create Net Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05). IEEE Press, 157-168.
  • 51
    • 0034449542 scopus 로고    scopus 로고
    • YU, T., MA, X., AND WINSLETT, M. 2000. PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'00). 210-219.
    • YU, T., MA, X., AND WINSLETT, M. 2000. PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'00). 210-219.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.