메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 732-738

An anonymous property-based attestation protocol from bilinear maps

Author keywords

[No Author keywords available]

Indexed keywords

BILINEAR MAP; COMPUTATION COSTS; DISCRETE LOGARITHMS; ELLIPTIC CURVE CRYPTOGRAPHY; IDENTITY ATTESTATION; PROPERTY-BASED ATTESTATION; PROVABLE SECURITY; REMOTE ATTESTATION; SECURITY PROPERTIES; TRUST COMPUTING;

EID: 70749104912     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.84     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 3
    • 54249108575 scopus 로고    scopus 로고
    • On a possible privacy flaw in direct anonymous attestation (DAA)
    • Adrian Leung, Liqun Chen, Chris J. Mitchell. On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008:179-190.
    • (2008) TRUST , pp. 179-190
    • Leung, A.1    Chen, L.2    Mitchell, C.J.3
  • 4
    • 52149103884 scopus 로고    scopus 로고
    • A new direct anonymous attestation scheme from bi-linear maps
    • Ernie Brickell, Liqun Chen, Jiangtao Li. A New Direct Anonymous Attestation Scheme from Bi-linear Maps. TRUST 2008: 166-178.
    • (2008) TRUST , pp. 166-178
    • Brickell, E.1    Chen, L.2    Li, J.3
  • 5
    • 52149086372 scopus 로고    scopus 로고
    • Pairings in trusted computing
    • Liqun Chen, Paul Morrissey, Nigel P. Smart. Pairings in Trusted Computing. Pairing 2008:1-17.
    • Pairing , vol.2008 , pp. 1-17
    • Chen, L.1    Morrissey, P.2    Nigel, P.S.3
  • 6
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, California, August
    • Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. 13th Usenix Security Symposium, San Diego, California, August, 2004.
    • (2004) 13th Usenix Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 7
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about prop-erties, not mechanisms[C]
    • Nova Scotia, Canada, ACM Press: 67-77, September
    • A. Sadeghi, C. Stüble, Property-based Attestation for Computing Platforms: Caring about prop-erties, not mechanisms[C], New Security Paradigms Workshop, Nova Scotia, Canada, ACM Press: 67-77, September 2004.
    • (2004) New Security Paradigms Workshop
    • Sadeghi, A.1    Stüble, C.2
  • 8
    • 24644439462 scopus 로고    scopus 로고
    • Els van herreweghen, michael waidner, property attestation - Scalable and privacy-friendly security assessment of peer computers[R]
    • October 5
    • Jonathan Poritz, Matthias Schunter, Els Van Herreweghen, Michael Waidner, Property Attestation - Scalable and Privacy-friendly Security Assessment of Peer Computers[R], IBM Research Technical Report RZ 3548, October 5, 2004.
    • (2004) IBM Research Technical Report RZ 3548
    • Poritz, J.1    Schunter, M.2
  • 11
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001).
    • (2001) CRYPTO 2001. LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 12
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M. (ed.) Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.. Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp.56-72. Springer, Heidelberg (2004).
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum, editor, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 129-140. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1992.
    • (1992) Advances in Cryptology - CRYPTO '91, Volume 576 of LNCS , pp. 129-140
    • Pedersen, T.P.1
  • 14
    • 0002882557 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Springer, Heidelberg
    • J. Camenisch, M. Stadler. Efficient group signature schemes for large groups. In: CAIP 1997. LNCS, vol. 1296, pp. 410-424. Springer, Heidelberg (1997).
    • (1997) CAIP 1997. LNCS , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 15
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • V. Shoup. Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint report 2004/332, 2004.
    • (2004) Cryptology ePrint Report 2004/332
    • Shoup, V.1
  • 19
    • 26444562547 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FRreduction
    • Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano. New explicit conditions of elliptic curve traces for FRreduction. IEICE Trans. E85-A(2), pp. 481-484, 2002.
    • (2002) IEICE Trans. E85-A(2) , pp. 481-484
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.