메뉴 건너뛰기




Volumn 109, Issue 15, 2009, Pages 846-849

Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05

Author keywords

Ad hoc anonymous identification; Attack; Bilinear pairings; Cryptography

Indexed keywords

AD HOC GROUPS; AD-HOC ANONYMOUS IDENTIFICATION; ATTACK; BILINEAR PAIRING; BILINEAR PAIRINGS; CRYPTOGRAPHIC PRIMITIVES; GROUP MEMBERS; ID-BASED; IDENTIFICATION PROTOCOL; IDENTIFICATION SCHEME; MULTI-USER;

EID: 67349237088     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ipl.2009.04.002     Document Type: Article
Times cited : (7)

References (15)
  • 2
    • 0033279983 scopus 로고    scopus 로고
    • Anonymous authentication with subset queries
    • ACM Press
    • Boneh D., and Franklin M. Anonymous authentication with subset queries. Proceedings of 6th ACM-CCS (1999), ACM Press 73-82
    • (1999) Proceedings of 6th ACM-CCS , pp. 73-82
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • CRYPTO 2001, Springer-Verlag
    • Boneh D., and Franklin M. Identity-based encryption from the Weil pairing. CRYPTO 2001. LNCS vol. 2139 (2001), Springer-Verlag 213-229
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • EUROCRYPT 2000, Springer-Verlag
    • Boudot F. Efficient proofs that a committed number lies in an interval. EUROCRYPT 2000. LNCS vol. 1807 (2000), Springer-Verlag 431-444
    • (2000) LNCS , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 5
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - easy go divisible cash
    • EUROCRYPT 1998, Springer-Verlag
    • Chan A., Frankel Y., and Tsiounis Y. Easy come - easy go divisible cash. EUROCRYPT 1998. LNCS vol. 1403 (1998), Springer-Verlag 561-575
    • (1998) LNCS , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 6
    • 35048854233 scopus 로고    scopus 로고
    • Anonymous identification in Ad Hoc groups
    • EUROCRYPT 2004, Springer-Verlag
    • Dodis Y., Kiayias A., Nicolosi A., and Shoup V. Anonymous identification in Ad Hoc groups. EUROCRYPT 2004. LNCS vol. 3027 (2004), Springer-Verlag 609-626
    • (2004) LNCS , vol.3027 , pp. 609-626
    • Dodis, Y.1    Kiayias, A.2    Nicolosi, A.3    Shoup, V.4
  • 7
    • 84990731886 scopus 로고
    • How to prove yourself: practical solutions to identification and signature problems
    • CRYPTO 1986, Springer-Verlag
    • Fiat A., and Shamir A. How to prove yourself: practical solutions to identification and signature problems. CRYPTO 1986. LNCS vol. 263 (1987), Springer-Verlag 186-194
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 8
    • 0023569922 scopus 로고
    • Zero knowledge proofs of identity
    • U. Feige, A. Fiat, A. Shamir, Zero knowledge proofs of identity, in: STOC'87, 1987, pp. 210-217
    • (1987) STOC'87 , pp. 210-217
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 10
    • 23044528649 scopus 로고    scopus 로고
    • Design and security analysis of anonymous group identification protocols
    • PKC 2002, Springer-Verlag
    • Lee C.H., Deng X., and Zhu H. Design and security analysis of anonymous group identification protocols. PKC 2002. LNCS vol. 2274 (2002), Springer-Verlag 188-198
    • (2002) LNCS , vol.2274 , pp. 188-198
    • Lee, C.H.1    Deng, X.2    Zhu, H.3
  • 11
    • 24144480841 scopus 로고    scopus 로고
    • Accumulators from bilinear pairings and applications
    • CT-RSA 2005, Springer-Verlag
    • Nguyen L. Accumulators from bilinear pairings and applications. CT-RSA 2005. LNCS vol. 3376 (2005), Springer-Verlag 275-292
    • (2005) LNCS , vol.3376 , pp. 275-292
    • Nguyen, L.1
  • 15
    • 57349104431 scopus 로고    scopus 로고
    • Analysis of bilinear pairing-based accumulator for identity escrowing
    • Tartary C., Zhou S., Lin D., Wang H., and Pieprzyk J. Analysis of bilinear pairing-based accumulator for identity escrowing. Information Security, IET 2 4 (2008) 99-107
    • (2008) Information Security, IET , vol.2 , Issue.4 , pp. 99-107
    • Tartary, C.1    Zhou, S.2    Lin, D.3    Wang, H.4    Pieprzyk, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.