메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 47-62

Anonymous authentication with TLS and DAA

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS AUTHENTICATION; ANONYMOUS CREDENTIAL SYSTEMS; DIRECT ANONYMOUS ATTESTATIONS; HARDWARE SECURITY; PRIVACY-PRESERVING AUTHENTICATION; REFERENCE IMPLEMENTATION; SOFTWARE IMPLEMENTATION; STANDARD PROTOCOLS; TRANSPORT LAYER SECURITY; TRUSTED PLATFORM MODULE;

EID: 77954709221     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_4     Document Type: Conference Paper
Times cited : (24)

References (30)
  • 3
    • 85013594843 scopus 로고    scopus 로고
    • Securing peer-to-peer networks using Trusted Computing
    • IEEE Press, Los Alamitos
    • Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using Trusted Computing. In: Trusted Computing, pp. 271-298. IEEE Press, Los Alamitos (2005)
    • (2005) Trusted Computing , pp. 271-298
    • Balfe, S.1    Lakhani, A.D.2    Paterson, K.G.3
  • 4
    • 84957360970 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480-494. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 480-494
    • Barić, N.1    Pfitzmann, B.2
  • 9
    • 70349608477 scopus 로고    scopus 로고
    • Simplified security notions of Direct Anonymous Attestation and a concrete scheme from pairings
    • Brickell, E., Chen, L., Li, J.: Simplified security notions of Direct Anonymous Attestation and a concrete scheme from pairings. International Journal of Information Security 8(5), 315-330 (2009)
    • (2009) International Journal of Information Security , vol.8 , Issue.5 , pp. 315-330
    • Brickell, E.1    Chen, L.2    Li, J.3
  • 10
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-88 (1981)
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 13
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. ACM Commun. 28(10), 1030-1044 (1985)
    • (1985) ACM Commun. , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 15
    • 52149086372 scopus 로고    scopus 로고
    • Pairings in Trusted Computing
    • Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
    • Chen, L., Morrissey, P., Smart, N.: Pairings in Trusted Computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 1-17. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5209 , pp. 1-17
    • Chen, L.1    Morrissey, P.2    Smart, N.3
  • 17
    • 57049104588 scopus 로고    scopus 로고
    • Universally composable security analysis of TLS
    • Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. Springer, Heidelberg
    • Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.R., Schwenk, J.: Universally composable security analysis of TLS. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 313-327. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5324 , pp. 313-327
    • Gajek, S.1    Manulis, M.2    Pereira, O.3    Sadeghi, A.R.4    Schwenk, J.5
  • 20
    • 38149073252 scopus 로고    scopus 로고
    • Ninja: Non identity based, privacy preserving authentication for ubiquitous environments
    • Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. Springer, Heidelberg
    • Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 73-90. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4717 , pp. 73-90
    • Leung, A.1    Mitchell, C.J.2
  • 21
    • 77954736866 scopus 로고    scopus 로고
    • Lindell, A.Y.: Anonymous authentication. Aladdin Knowledge Systems Inc. (2006), http://www.aladdin.com/blog/pdf/AnonymousAuthentication.pdf
    • (2006) Anonymous Authentication
    • Lindell, A.Y.1
  • 22
    • 26444607972 scopus 로고    scopus 로고
    • Dynamic k-times anonymous authentication
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 318-333. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 318-333
    • Nguyen, L.1    Safavi-Naini, R.2
  • 24
    • 77954724655 scopus 로고    scopus 로고
    • Supergeek pulls off 'near impossible' crypto chip hack
    • February
    • Robertson, J.: Supergeek pulls off 'near impossible' crypto chip hack. News article at NZ Herald (February 2010), http://www.nzherald.co.nz/technology/ news/article.cfm?c-id=5&objectid=10625082&pnum=0
    • (2010) News Article at NZ Herald
    • Robertson, J.1
  • 26
    • 84956867779 scopus 로고    scopus 로고
    • Anonymous authentication of membership in dynamic groups
    • Franklin, M.K. (ed.) FC 1999. Springer, Heidelberg
    • Schechter, S., Parnell, T., Hartemink, A.: Anonymous authentication of membership in dynamic groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 184-195. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1648 , pp. 184-195
    • Schechter, S.1    Parnell, T.2    Hartemink, A.3
  • 27
    • 38149070279 scopus 로고    scopus 로고
    • Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators
    • Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
    • Smyth, B., Ryan, M., Chen, L.: Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 218-231. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4572 , pp. 218-231
    • Smyth, B.1    Ryan, M.2    Chen, L.3
  • 28
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Federrath, H. (ed.) Designing Privacy Enhancing Technologies. Springer, Heidelberg
    • Syverson, P.F., Tsudik, G., Reed, M.G., Landwehr, C.E.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.F.1    Tsudik, G.2    Reed, M.G.3    Landwehr, C.E.4
  • 29
    • 77954730375 scopus 로고    scopus 로고
    • Trusted Computing Group: Version 1.2, Level 1, Errata A
    • Trusted Computing Group: TCG Software Stack Specification Version 1.2, Level 1, Errata A
    • TCG Software Stack Specification
  • 30
    • 77954408441 scopus 로고    scopus 로고
    • Trusted Computing Group: Version 1.2, Revision 103
    • Trusted Computing Group: TCG TPM Specification, Version 1.2, Revision 103
    • TCG TPM Specification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.