메뉴 건너뛰기




Volumn 3, Issue 12, 2008, Pages 43-50

Direct anonymous attestation for next generation TPM

Author keywords

Direct anonymous attestation; ECC; Trusted computing platform; Trusted platform module

Indexed keywords

CRYPTOGRAPHY; HARDWARE SECURITY;

EID: 72849152401     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.3.12.43-50     Document Type: Conference Paper
Times cited : (48)

References (23)
  • 1
    • 33646781565 scopus 로고    scopus 로고
    • An Efficient Group Signature Scheme from Bilinear Maps
    • Jun Furukawa, Hideki Imai: An Efficient Group Signature Scheme from Bilinear Maps. IEICE Transactions 89-A(5): 1328-1338 (2006)
    • (2006) IEICE Transactions , vol.89-A , Issue.5 , pp. 1328-1338
    • Jun Furukawa, H.I.1
  • 3
    • 38049042811 scopus 로고    scopus 로고
    • Tate: A Direct Anonymous Attestation Scheme for Embedded Devices
    • He Ge, Stephen R. Tate: A Direct Anonymous Attestation Scheme for Embedded Devices. Public Key Cryptography 2007: 16-30
    • (2007) Public Key Cryptography , pp. 16-30
    • Ge, H.1    Stephen, R.2
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • Dan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. CRYPTO 2004: 41-55
    • (2004) CRYPTO , pp. 41-55
    • Boneh, D.1    Xavier Boyen, H.S.2
  • 5
    • 70350679379 scopus 로고    scopus 로고
    • National Security Agency, Accessed on April 11, 2006
    • National Security Agency. The Case for Elliptic Curve Cryptography, Accessed on April 11, 2006. http://www.nsa.gov/ia/industry/ crypto_eliptic_curve.cfm.
    • The Case for Elliptic Curve Cryptography
  • 6
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO'91, of, Springer Verlag
    • Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO'91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 129-140
    • Pryds Pedersen, T.1
  • 7
    • 78651566114 scopus 로고    scopus 로고
    • TCG.http://www.trustedcomputinggroup.org
    • TCG.http://www.trustedcomputinggroup.org
  • 8
    • 84990731886 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • CRYPTO'86, of
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO'86, vol. 263 of LNCS, pp. 186-194.
    • LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 9
    • 26444562547 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. E85-A(2), pp. 481-484, 2002.
    • (2002) IEICE Trans , vol.E85-A , Issue.2 , pp. 481-484
    • Miyaji, A.1    Masaki Nakabayashi, S.T.2
  • 10
    • 35048847167 scopus 로고    scopus 로고
    • Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
    • Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
  • 14
    • 58349104351 scopus 로고    scopus 로고
    • Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive
    • Report 2007/194
    • Ernie Brickell,Jiangtao Li,Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive, Report 2007/194
    • Ernie Brickell, J.L.1
  • 15
    • 0000901529 scopus 로고    scopus 로고
    • D.Pointcheval and J.Stern,Security arguments for digital signatures and blind signatures,J.Crytol.,13,no.3,pp.361-396,2000.
    • D.Pointcheval and J.Stern,Security arguments for digital signatures and blind signatures,J.Crytol.,vol.13,no.3,pp.361-396,2000.
  • 16
    • 33845516445 scopus 로고    scopus 로고
    • Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
    • Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
  • 17
    • 33749405352 scopus 로고    scopus 로고
    • Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer
    • Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer Computing 2005: 117-124
    • (2005) Computing , pp. 117-124
    • Balfe, S.1    Lakhani, A.D.2
  • 19
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • SCN of, Springer Verlag
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, vol. 2576 of LNCS, pp. 268-289. Springer Verlag, 2003.
    • (2002) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 21
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • B. Kaliski,editor, Advances in Cryptology, CRYPTO'97, of, SpringerVerlag
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski,editor, Advances in Cryptology - CRYPTO'97, volume 1296 of LNCS, pages 410-424. SpringerVerlag, 1997.
    • (1997) LNCS , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 22
    • 78651546109 scopus 로고    scopus 로고
    • Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
    • Villach,Austria,March
    • Ernie Brickell,Liqun Chen and Jiangtao Li. Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings,In Conference on Trusted Computing(TRUST 2008),Villach,Austria,March 2008.
    • (2008) Conference on Trusted Computing(TRUST
    • Ernie Brickell, L.C.1    Li, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.