메뉴 건너뛰기




Volumn 6052 LNCS, Issue , 2010, Pages 66-81

Unlinkable priced oblivious transfer with rechargeable wallets

Author keywords

[No Author keywords available]

Indexed keywords

ACCOUNT BALANCE; DATABASE RECORDS; OBLIVIOUS TRANSFER; OBLIVIOUS TRANSFER PROTOCOLS; RANDOM ORACLE; THE STANDARD MODEL;

EID: 77955331156     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14577-3_8     Document Type: Conference Paper
Times cited : (26)

References (29)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • Pfitzmann,B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, p. 119. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 119
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 0030646696 scopus 로고    scopus 로고
    • Optimistic protocols for fair exchange
    • ACM Press, New York
    • Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: ACM CCS 1997. ACM Press, New York (1997)
    • (1997) ACM CCS 1997
    • Asokan, N.1    Schunter, M.2    Waidner, M.3
  • 3
    • 0033750375 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE JSAC 18(4), 593-610 (2000)
    • (2000) IEEE JSAC , vol.18 , Issue.4 , pp. 593-610
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 4
    • 33749993205 scopus 로고    scopus 로고
    • Constant-size dynamic k-TAA
    • De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
    • Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.4116, pp. 111-125. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4116 , pp. 111-125
    • Au, M.H.1    Susilo, W.2    Mu, Y.3
  • 5
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 390-420. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 6
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 7
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 8
    • 84957366640 scopus 로고    scopus 로고
    • Rapid demonstration of linear relations connected by boolean operators
    • Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Brands, S.: Rapid demonstration of linear relations connected by boolean operators. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.1233, pp. 318-333. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 318-333
    • Brands, S.1
  • 9
    • 58349085879 scopus 로고    scopus 로고
    • Efficient protocols for set membership and range proofs
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Camenisch, J., Chaabouni, R., Shelat, A.: Efficient protocols for set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.5350, pp. 234-252. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 234-252
    • Camenisch, J.1    Chaabouni, R.2    Shelat, A.3
  • 10
    • 74049137084 scopus 로고    scopus 로고
    • Oblivious transfer with access control
    • ACM Press, New York
    • Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious transfer with access control. In: ACM CCS 2009. ACM Press, New York (2009)
    • (2009) ACM CCS 2009
    • Camenisch, J.1    Dubovitskaya, M.2    Neven, G.3
  • 12
    • 67650686038 scopus 로고    scopus 로고
    • On the portability of generalized schnorr proofs
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Camenisch, J., Kiayias, A., Yung, M.: On the portability of generalized schnorr proofs. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.5479, pp. 425-442. Springer, Heidelberg (2010)
    • LNCS , vol.5479 , Issue.2010 , pp. 425-442
    • Camenisch, J.1    Kiayias, A.2    Yung, M.3
  • 13
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Camenisch, J., Michels, M.: Proving in zero-knowledge that a number n is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.1592, p. 107. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 107
    • Camenisch, J.1    Michels, M.2
  • 15
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.4515, pp. 573-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    Shelat, A.3
  • 16
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 126-144. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 17
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.1294, pp. 410-424. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 19
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press, Los Alamitos
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) FOCS 2001
    • Canetti, R.1
  • 20
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Chaum, D., Pedersen, T.P.:Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 89-105. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 21
    • 67049100253 scopus 로고    scopus 로고
    • Controlling access to an oblivious database using stateful anonymous credentials
    • Jareck, S., Tsudik, G. (eds.)PKC 2009. Springer, Heidelberg
    • Coull, S., Green, M., Hohenberger, S.: Controlling access to an oblivious database using stateful anonymous credentials. In: Jareck, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.5443, pp. 501-520. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 501-520
    • Coull, S.1    Green, M.2    Hohenberger, S.3
  • 22
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
    • Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.3386, pp. 416-431. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 23
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469-472 (1985)
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 24
    • 77955086989 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • ACM Press, New York
    • Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: ACM STOC. ACM Press, New York (1998)
    • (1998) ACM STOC.
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 25
    • 0034447081 scopus 로고    scopus 로고
    • Composition and integrity preservation of secure reactive systems
    • ACM Press, New York
    • Pfitzmann, B., Waidner, M.: Composition and integrity preservation of secure reactive systems. In: ACM CCS 2000. ACM Press, New York (2000)
    • (2000) ACM CCS 2000
    • Pfitzmann, B.1    Waidner, M.2
  • 26
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 239-252 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 27
    • 35248831111 scopus 로고    scopus 로고
    • Practical oblivious transfer protocols
    • Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
    • Tobias, C.: Practical oblivious transfer protocols. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.2578, pp. 415-426. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2578 , pp. 415-426
    • Tobias, C.1
  • 28
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE Computer Society Press, Los Alamitos
    • Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) IEEE Symposium on Research in Security and Privacy
    • Pfitzmann, B.1    Waidner, M.2
  • 29
    • 70049105527 scopus 로고    scopus 로고
    • Universallycomposableadaptivepricedoblivious transfer
    • Shacham,H. (ed.) Pairing2009. .Springer,Heidelberg
    • Rial,A.,Kohlweiss,M.,Preneel,B.: Universallycomposableadaptivepricedoblivious transfer. In:Shacham,H. (ed.) Pairing2009.LNCS, vol.5671, pp. 231-247.Springer,Heidelberg(2009)
    • (2009) LNCS , vol.5671 , pp. 231-247
    • Rial, A.1    Kohlweiss, M.2    Preneel, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.