메뉴 건너뛰기




Volumn 5580 LNCS, Issue , 2009, Pages 198-216

Threshold attribute-based signatures and their application to anonymous credential systems

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS CREDENTIAL SYSTEMS; CREDENTIAL SYSTEMS; SECURITY MODEL; SIGNATURE HOLDERS; SIGNATURE SCHEME; THE STANDARD MODEL;

EID: 70350676690     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02384-2_13     Document Type: Conference Paper
Times cited : (205)

References (25)
  • 1
    • 84983104598 scopus 로고
    • On Defining Proofs of Knowledge
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 3
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 4
    • 84958612917 scopus 로고    scopus 로고
    • Efficient Group Signature Schemes for Large Groups
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: FOCS
    • Los Alamitos
    • Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: FOCS 2001, pp. 136-145. IEEE, Los Alamitos (2001)
    • (2001) 136-145. IEEE , pp. 2001
    • Canetti, R.1
  • 6
    • 0022145479 scopus 로고
    • Security Without Identification: Transaction Systems to Make Big Brother Obsolete
    • Chaum, D.: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28(10), 1030-1044 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 7
    • 79251590715 scopus 로고
    • A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Chaum, D., Evertse, J.-H.: A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 118-167. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 8
    • 84957802212 scopus 로고    scopus 로고
    • Cramer, R., Damgård, L., MacKenzie, P.D.: Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 354-373. Springer, Heidelberg (2000)
    • Cramer, R., Damgård, L., MacKenzie, P.D.: Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 354-373. Springer, Heidelberg (2000)
  • 9
    • 85016672373 scopus 로고
    • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 10
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-Based Cryptography
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 11
    • 71149116146 scopus 로고
    • Proofs that Yield Nothing But Their Validity for All Languages in NP Have Zero-Knowledge Proof Systems
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that Yield Nothing But Their Validity for All Languages in NP Have Zero-Knowledge Proof Systems. J. ACM 38(3), 691-729 (1991)
    • (1991) J. ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 12
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput. 18(1), 186-208 (1989)
    • (1989) SIAM J. Comput , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 14
    • 77953575420 scopus 로고    scopus 로고
    • Attribute Based Group Signature with Revocation. Cryptology ePrint Archive, Report 2007/241
    • Khader, D.: Attribute Based Group Signature with Revocation. Cryptology ePrint Archive, Report 2007/241 (2007), http://eprint.iacr.org/2007/241
    • Khader, D.1
  • 15
    • 77953561932 scopus 로고    scopus 로고
    • Attribute Based Group Signatures. Cryptology ePrint Archive, Report 2007/159
    • Khader, D.: Attribute Based Group Signatures. Cryptology ePrint Archive, Report 2007/159 (2007), http://eprint.iacr.org/2007/159
    • Khader, D.1
  • 16
    • 78649869004 scopus 로고    scopus 로고
    • Authenticating with Attributes. Cryptology ePrint Archive
    • Report 2008/031
    • Khader, D.: Authenticating with Attributes. Cryptology ePrint Archive, Report 2008/031 (2008), http://eprint.iacr.org/2008/031
    • (2008)
    • Khader, D.1
  • 17
    • 67650360607 scopus 로고    scopus 로고
    • Attribute-Based Ring Signatures. Cryptology ePrint Archive
    • Report 2008/394
    • Li, J., Kim, K.: Attribute-Based Ring Signatures. Cryptology ePrint Archive, Report 2008/394 (2008), http://eprint.iacr.org/2008/394
    • (2008)
    • Li, J.1    Kim, K.2
  • 19
    • 67651053584 scopus 로고    scopus 로고
    • Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym Systems. In: Heys, H.M., Adams, CM. (eds.) SAC 1999. LNCS, 1758, pp. 184-199. Springer, Heidelberg (2000)
    • Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym Systems. In: Heys, H.M., Adams, CM. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
  • 20
    • 76549132529 scopus 로고    scopus 로고
    • Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance. Cryptology ePrint Archive
    • Report 2008/328
    • Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance. Cryptology ePrint Archive, Report 2008/328 (2008), http://eprint.iacr.org/2008/328
    • (2008)
    • Maji, H.1    Prabhakaran, M.2    Rosulek, M.3
  • 21
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R, ed, EU-ROCRYPT 2005, Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 22
    • 84871486180 scopus 로고    scopus 로고
    • Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Cryptology ePrint Archive
    • Report 2009/126
    • Shahandashti, S.F., Safavi-Naini, R.: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Cryptology ePrint Archive, Report 2009/126 (2009), http://eprint.iacr.org/2009/126
    • (2009)
    • Shahandashti, S.F.1    Safavi-Naini, R.2
  • 23
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 24
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 25
    • 70350667481 scopus 로고    scopus 로고
    • 25. Yang, P., Cao, Z., Dong, X.: Fuzzy Identity Based Signature. Cryptology ePrint Archive, Report 2008/002 (2008), http://eprint.iacr.org/2008/ 002
    • 25. Yang, P., Cao, Z., Dong, X.: Fuzzy Identity Based Signature. Cryptology ePrint Archive, Report 2008/002 (2008), http://eprint.iacr.org/2008/ 002


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.