메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-8

Rethinking accountable privacy supporting services

Author keywords

Accountability; Anonymous credential systems; Cryptographic protocols; Privacy; Time capsule; Verifiable encryption

Indexed keywords

ACCOUNTABILITY; ANONYMOUS CREDENTIAL SYSTEMS; CRYPTOGRAPHIC PROTOCOLS; PRIVACY; TIME CAPSULE; VERIFIABLE ENCRYPTION;

EID: 70349238641     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456424.1456426     Document Type: Conference Paper
Times cited : (12)

References (40)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
    • V. Shoup, editor, Advances in Cryptology, CRYPTO 2005, of, Springer Verlag
    • M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 205-222. Springer Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 2
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • M. Bellare, editor, Advances in Cryptology, CRYPTO 2000, of, Springer Verlag
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 3
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • M. K. Franklin, editor, Advances in Cryptology, CRYPTO 2004, of, Springer Verlag
    • D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 4
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • B. Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Springer Verlag
    • F. Boudot. Efficient proofs that a committed number lies in an interval. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 431-444. Springer Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 5
    • 0010280770 scopus 로고
    • An efficient off-line electronic cash system based on the representation problem
    • Technical Report CS-R9323, CWI, Apr
    • S. Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI, Apr. 1993.
    • (1993)
    • Brands, S.1
  • 6
    • 54349111494 scopus 로고
    • Restrictive blinding of secret-key certificates
    • Technical Report CS-R9509, CWI, Sept
    • S. Brands. Restrictive blinding of secret-key certificates. Technical Report CS-R9509, CWI, Sept. 1995.
    • (1995)
    • Brands, S.1
  • 7
    • 54349111494 scopus 로고
    • Secret-key certificates
    • Technical Report CS-R9510, CWI, Sept
    • S. Brands. Secret-key certificates. Technical Report CS-R9510, CWI, Sept. 1995.
    • (1995)
    • Brands, S.1
  • 8
    • 84957366640 scopus 로고    scopus 로고
    • Rapid demonstration of linear relations connected by boolean operators
    • W. Fumy, editor, Advances in Cryptology, EUROCRYPT '97, of, Springer Verlag
    • S. Brands. Rapid demonstration of linear relations connected by boolean operators. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 318-333. Springer Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 318-333
    • Brands, S.1
  • 10
    • 24944435537 scopus 로고    scopus 로고
    • Compact E-cash
    • R. Cramer, editor, Advances in Cryptology, Eurocrypt 2005, of, Springer
    • J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact E-cash. In R. Cramer, editor, Advances in Cryptology - Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 302-321. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 11
    • 70349247214 scopus 로고    scopus 로고
    • Public key encryption with oblivious keyword search and its application to data retention
    • 3708, IBM Research, May
    • J. Camenisch, M. Kohlweiss, A. R. Durán, and C. Sheedy. Public key encryption with oblivious keyword search and its application to data retention. IBM Research Report RZ 3708, IBM Research, May 2008. http://domino.research. ibm.com/library/cyberdig.nsf/index.html.
    • (2008) IBM Research Report RZ
    • Camenisch, J.1    Kohlweiss, M.2    Durán, A.R.3    Sheedy, C.4
  • 12
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • B. Pfitzmann, editor, Advances in Cryptology, EUROCRYPT 2001, of, Springer Verlag
    • J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, of, Springer Verlag
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • M. K. Franklin, editor, Advances in Cryptology, CRYPTO 2004, of, Springer Verlag
    • J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 56-72. Springer Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 15
    • 70349242589 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • Technical Report RS-98-29, BRICS, Departement of Computer Science, University of Aarhus, Nov
    • J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. Technical Report RS-98-29, BRICS, Departement of Computer Science, University of Aarhus, Nov. 1998.
    • (1998)
    • Camenisch, J.1    Michels, M.2
  • 16
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • J. Stern, editor, Advances in Cryptology, EUROCRYPT '99, of, Springer Verlag
    • J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 107-122. Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 17
    • 84921060028 scopus 로고    scopus 로고
    • Separability and efficiency for generic group signature schemes
    • M. Wiener, editor, Advances in Cryptology, CRYPTO '99, of, Springer Verlag
    • J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In M. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 413-430. Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 413-430
    • Camenisch, J.1    Michels, M.2
  • 18
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • D. Boneh, editor, Advances in Cryptology, CRYPTO 2003, of
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 126-144, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 19
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • B. Kaliski, editor, Advances in Cryptology, CRYPTO '97, of, Springer Verlag
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski, editor, Advances in Cryptology - CRYPTO '97, volume 1296 of Lecture Notes in Computer Science, pages 410-424. Springer Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 21
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - easy go divisible cash
    • K. Nyberg, editor, Advances in Cryptology, EUROCRYPT '98, of, Springer Verlag
    • A. Chan, Y. Frankel, and Y. Tsiounis. Easy come - easy go divisible cash. In K. Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pages 561-575. Springer Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 22
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, Feb. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 23
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Plenum Press
    • D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology - Proceedings of CRYPTO '82, pages 199-203. Plenum Press, 1983.
    • (1983) Advances in Cryptology - Proceedings of CRYPTO '82 , pp. 199-203
    • Chaum, D.1
  • 24
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, Oct. 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 25
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • M. Odlyzko, editor, Advances in Cryptology, CRYPTO '86, of, Springer-Verlag
    • D. Chaum and J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 118-167. Springer-Verlag, 1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 26
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • E. F. Brickell, editor, Advances in Cryptology, CRYPTO '92, of, Springer-Verlag
    • D. Chaum and T. P. Pedersen. Wallet databases with observers. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 89-105. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 27
    • 85024290278 scopus 로고
    • Group signatures
    • D. W. Davies, editor, Advances in Cryptology, EUROCRYPT '91, of, Springer-Verlag
    • D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 28
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Y. G. Desmedt, editor, Advances in Cryptology, CRYPTO '94, of, Springer Verlag
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 30
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. M. Odlyzko, editor, Advances in Cryptology, CRYPTO '86, of, Springer Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer Verlag, 1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 31
    • 84947809856 scopus 로고    scopus 로고
    • Fair off-line e-cash made easy
    • K. Kim and T. Matsumoto, editors, Advances in Cryptology, ASIACRYPT '98, of, Springer Verlag
    • Y. Frankel, Y. Tsiounis, and M. Yung. Fair off-line e-cash made easy. In K. Kim and T. Matsumoto, editors, Advances in Cryptology - ASIACRYPT '98, volume 1514 of Lecture Notes in Computer Science, pages 257-270. Springer Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 257-270
    • Frankel, Y.1    Tsiounis, Y.2    Yung, M.3
  • 32
    • 77954124943 scopus 로고
    • A practical secret voting scheme for large scale elections
    • J. Seberry and Y. Zheng, editors, ASIACRYPT, of, Springer
    • A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In J. Seberry and Y. Zheng, editors, ASIACRYPT, volume 718 of Lecture Notes in Computer Science, pages 244-251. Springer, 1992.
    • (1992) Lecture Notes in Computer Science , vol.718 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 33
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • B. Kaliski, editor, Advances in Cryptology, CRYPTO '97, of, Springer Verlag
    • E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In B. Kaliski, editor, Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 16-30. Springer Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 34
    • 38149091799 scopus 로고    scopus 로고
    • Blind identity-based encryption and simulatable oblivious transfer
    • M. Green and S. Hohenberger. Blind identity-based encryption and simulatable oblivious transfer. In ASIACRYPT, pages 265-282, 2007.
    • (2007) ASIACRYPT , pp. 265-282
    • Green, M.1    Hohenberger, S.2
  • 35
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • A. Kiayias and M. Yung. Secure scalable group signature with dynamic joins and separable authorities. IJSN, 1(1/2):24-45, 2006.
    • (2006) IJSN , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 36
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, of, Springer
    • A. Kiayias, M. Yung, and Y. Tsiounis. Traceable signatures. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 571-589. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 571-589
    • Kiayias, A.1    Yung, M.2    Tsiounis, Y.3
  • 38
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum, editor, Advances in Cryptology, CRYPTO '91, of, Springer Verlag
    • T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 39
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 40
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239-252, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.