메뉴 건너뛰기




Volumn , Issue , 2008, Pages 15-24

Minimal information disclosure with efficiently verifiable credentials

Author keywords

Credential; Hash tree; Identity assertion; Identity management; Merkle tree; PKI; Privacy

Indexed keywords

CREDENTIAL; HASH-TREE; IDENTITY ASSERTION; IDENTITY MANAGEMENT; MERKLE TREE; PKI; PRIVACY;

EID: 70349255572     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456424.1456428     Document Type: Conference Paper
Times cited : (19)

References (19)
  • 7
    • 24944435537 scopus 로고    scopus 로고
    • Compact e-cash
    • R. Cramer, editor, Advances in Cryptology, EUROCRYPT '05, of
    • J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact e-cash. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT '05, volume 3494 of Lecture Notes in Computer Science, pages 302-321, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 11
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28, Oct 1985.
    • (1985) Communications of the ACM , vol.28
    • Chaum, D.1
  • 12
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • Springer-Verlag
    • D. Chaum and J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology, pages 118-167. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 13
    • 70349238082 scopus 로고    scopus 로고
    • Consumer fraud and identity theft complaint data, 2006
    • Consumer fraud and identity theft complaint data, 2006.
  • 14
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33:792-807, 1986.
    • (1986) J. ACM , vol.33 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 15
    • 70349231743 scopus 로고    scopus 로고
    • D. Hardt. Identity 2.0, 2005.
    • D. Hardt. Identity 2.0, 2005.
  • 17
    • 84969346266 scopus 로고
    • A certified digital signature
    • Springer-Verlag
    • R. Merkle. A certified digital signature. In Advances in Cryptography, pages 218-238. Springer-Verlag, 1989.
    • (1989) Advances in Cryptography , pp. 218-238
    • Merkle, R.1
  • 18
    • 70349253452 scopus 로고    scopus 로고
    • Microsoft. Microsoft's vision for an identity metasystem, 2005.
    • Microsoft. Microsoft's vision for an identity metasystem, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.