-
1
-
-
4043050062
-
Key-privacy in public-key encryption
-
Bellare, M., Boldyreva, A., Desai, A. and Pointcheval, D. (2001) ‘Key-privacy in public-key encryption’, Advances in Cryptology - Asiacrypt.
-
(2001)
Advances in Cryptology - Asiacrypt
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
3
-
-
25844517649
-
-
Institution of Electrical Engineers
-
Berg, O., Berg, T., Haavik, S., Hjelmstad, J. and Skaug, R. (1998) ‘Spread Spectrum in Mobile Communication’, Institution of Electrical Engineers.
-
(1998)
Spread Spectrum in Mobile Communication
-
-
Berg, O.1
Berg, T.2
Haavik, S.3
Hjelmstad, J.4
Skaug, R.5
-
4
-
-
23044483770
-
-
London: Cambridge University Press, Mathematical Society Lecture Note Series 317
-
Blake, I.F., Seroussi, G. and Smart, N. P. (2005) Advances in Elliptic Curve Cryptography, London: Cambridge University Press, Mathematical Society Lecture Note Series 317.
-
(2005)
Advances in Elliptic Curve Cryptography
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
6
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D. and Franklin, M. (2003) ‘Identity-based encryption from the weil pairing’, SIAM Journal of Computing, Vol. 3, pp.586–615.
-
(2003)
SIAM Journal of Computing
, vol.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84946840347
-
Short signatures from the weil pairing
-
Volume 2248 ofLNCS
-
Boneh, D., Lynn, B. and Shacham, H. (2001) ‘Short signatures from the weil pairing’, Proceedings of the Asiacrypt 2001, Volume 2248 ofLNCS, pp.514–532.
-
(2001)
Proceedings of the Asiacrypt 2001
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
15344342877
-
A novel solution for achieving anonymity in wireless ad hoc networks
-
Boukerche, A., El-Khatib, K., Xu, L. and Korba, L. (2004) ‘A novel solution for achieving anonymity in wireless ad hoc networks’, Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks.
-
(2004)
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
10
-
-
25844435663
-
A new id-based group signature scheme from bilinear pairings
-
Chen, X., Zhang, F. and Kim, K. (2003) ‘A new id-based group signature scheme from bilinear pairings’, Proceedings of 4th International Workshop on Information Security Applications (WISA), pp.585–592.
-
(2003)
Proceedings of 4th International Workshop on Information Security Applications (WISA)
, pp. 585-592
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
11
-
-
84952958717
-
-
Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems
-
Díaz, C. and Preneel, B. (2004) ‘Taxonomy of mixes and dummy traffic’, Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems.
-
(2004)
Taxonomy of mixes and dummy traffic
-
-
Díaz, C.1
Preneel, B.2
-
12
-
-
27944485356
-
On flow marking attacks in wireless anonymous communication networks
-
Fu, X., Zhu, Y., Graham, B., Bettati, R. and Zhao, W. (2005) ‘On flow marking attacks in wireless anonymous communication networks’, Proceedings of the ICDCS 2005.
-
(2005)
Proceedings of the ICDCS 2005
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
13
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer-Verlag
-
Fujisaki, E. and Okamoto, T. (1999) ‘Secure integration of asymmetric and symmetric encryption schemes’, Proceedings of the CRYPTO 99, Springer-Verlag, pp.537–554.
-
(1999)
Proceedings of the CRYPTO 99
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
14
-
-
34247344534
-
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
-
Huang, D. (2006) ‘Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems’, Proceedings of ACM Workshop on Wireless Security (WiSe).
-
(2006)
Proceedings of ACM Workshop on Wireless Security (WiSe)
-
-
Huang, D.1
-
15
-
-
3042632485
-
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
Kong, J. and Hong, X. (2003) ‘ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks’, ACM MobiHoc.
-
(2003)
ACM MobiHoc
-
-
Kong, J.1
Hong, X.2
-
18
-
-
33745883087
-
-
Working Draft
-
Pfitzmann, A. and Hansen, M. (2005) ‘Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology’, Working Draft, Avaliable at: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.26.doc.
-
(2005)
Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Shamir, A. (1985) ‘Identity-based cryptosystems and signature schemes’, Proceedings of Crypto’84, LNCS Volume 196, pp.47–53.
-
(1985)
Proceedings of Crypto’84, LNCS Volume 196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
84937565289
-
Towards an analysis of onion routing security
-
Syverson, P., Tsudik, G., Reed, M., and Landwehr, C. (2000). ‘Towards an analysis of onion routing security’, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pp.96–114.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
23
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F. and Deng, R.H. (2004) ‘Anonymous secure routing in mobile ad-hoc networks’, Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN’04).
-
(2004)
Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN’04)
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
24
-
-
84952968531
-
-
In all our following discussions, without special notation, we use the terms ‘pseudonym’ and ‘public key’ interchangeably
-
In all our following discussions, without special notation, we use the terms ‘pseudonym’ and ‘public key’ interchangeably.
-
-
-
-
25
-
-
84952969196
-
-
To get the admission to the anonymous communication system, the AU may rely on an anonymous credential system such as (Camenisch and Lysyanskaya, 2001) in order to derive a certificate
-
To get the admission to the anonymous communication system, the AU may rely on an anonymous credential system such as (Camenisch and Lysyanskaya, 2001) in order to derive a certificate.
-
-
-
-
26
-
-
84952956065
-
-
Pfitzmann and Hansen (2005) referred public pseudonyms to phone numbers, e-mail addresses, mail addresses and so on, which can be used as pseudonyms for the subjects’s identities. Since a public pseudonym can be easily linked to a unique subject, we consider the public pseudonym as another form of the identity
-
Pfitzmann and Hansen (2005) referred public pseudonyms to phone numbers, e-mail addresses, mail addresses and so on, which can be used as pseudonyms for the subjects’s identities. Since a public pseudonym can be easily linked to a unique subject, we consider the public pseudonym as another form of the identity.
-
-
-
-
27
-
-
84952958239
-
-
The hash function H is not used in PBE scheme. Its usage will be describe in our certificate scheme in the Section 5
-
The hash function H is not used in PBE scheme. Its usage will be describe in our certificate scheme in the Section 5.
-
-
-
|