메뉴 건너뛰기




Volumn 21, Issue 8, 2010, Pages 2070-2078

Direct anonymous attestation based on bilinear maps

Author keywords

Bilinear map; Direct anonymous attestation; Trusted computing platform; Trusted platform module

Indexed keywords

BILINEAR MAP; COMPUTATIONAL COSTS; DIFFIE HELLMAN; DIRECT ANONYMOUS ATTESTATIONS; PRACTICAL SOLUTIONS; SECURITY PROOFS; SECURITY REQUIREMENTS; SIGNING PROCESS; SYSTEM SECURITY; TRUSTED COMPUTING PLATFORM; TRUSTED PLATFORM MODULE; UNFORGEABILITY; UNLINKABILITY;

EID: 77955998709     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2010.03579     Document Type: Article
Times cited : (14)

References (20)
  • 3
    • 20444390989 scopus 로고    scopus 로고
    • An efficient and secure dynamic group signature scheme
    • (in Chinese with English abstract) [doi: 10.1360/jos160609]
    • He YF, Zhang JZ. An efficient and secure dynamic group signature scheme. Journal of Software, 2005, 16(4):609-615 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/609.htm [doi: 10.1360/jos160609]
    • (2005) Journal of Software , vol.16 , Issue.4 , pp. 609-615
    • He, Y.F.1    Zhang, J.Z.2
  • 4
    • 35048847167 scopus 로고    scopus 로고
    • Better privacy for trusted computing platforms
    • Molva D, ed. Berlin: Springer-Verlag
    • Camenisch J. Better privacy for trusted computing platforms. In: Molva D, ed. Proc. of the ESORICS. Berlin: Springer-Verlag, 2004. 73-88.
    • (2004) Proc. of the ESORICS , pp. 73-88
    • Camenisch, J.1
  • 8
    • 33845516445 scopus 로고    scopus 로고
    • Protecting (anonymous) credentials with the trusted computing group's TPM V1.2
    • Berlin: Springer-Verlag
    • Camenisch J. Protecting (anonymous) credentials with the trusted computing group's TPM V1.2. In: Proc. of the SEC 2006. Berlin: Springer-Verlag, 2006. 135-147.
    • (2006) Proc. of the SEC 2006 , pp. 135-147
    • Camenisch, J.1
  • 9
    • 38149073252 scopus 로고    scopus 로고
    • Ninja: Non identity based, privacy preserving authentication for ubiquitous environments
    • Krumm P, ed. LNCS 4717, Berlin: Springer-Verlag
    • Leung A, Mitchell CJ. Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm P, ed. Proc. of the 9th Int'l Conf. on Ubiquitous Computing. LNCS 4717, Berlin: Springer-Verlag, 2007. 73-90.
    • (2007) Proc. of the 9th Int'l Conf. on Ubiquitous Computing , pp. 73-90
    • Leung, A.1    Mitchell, C.J.2
  • 10
    • 38049042811 scopus 로고    scopus 로고
    • A direct anonymous attestation scheme for embedded devices
    • Berlin: Springer-Verlag
    • He G, Tate SR. A direct anonymous attestation scheme for embedded devices. In: Proc. of the Public Key Cryptography 2007. Berlin: Springer-Verlag, 2007. 16-30.
    • (2007) Proc. of the Public Key Cryptography 2007 , pp. 16-30
    • He, G.1    Tate, S.R.2
  • 11
    • 14844309671 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation
    • Atluri V, Pfitzmann B, McDaniel PD, eds. New York: ACM Press
    • Boneh D, Shacham H. Group signatures with verifier-local revocation. In: Atluri V, Pfitzmann B, McDaniel PD, eds. Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 168-177.
    • (2004) Proc. of the ACM Conf. on Computer and Communications Security , pp. 168-177
    • Boneh, D.1    Shacham, H.2
  • 12
    • 33646781565 scopus 로고    scopus 로고
    • An efficient group signature scheme from bilinear maps
    • Furukawa J, Imai H. An efficient group signature scheme from bilinear maps. IEICE Trans. on Fundamentals, 2006, 89-A(5): 1328-1338.
    • (2006) IEICE Trans. on Fundamentals , vol.89 A , Issue.5 , pp. 1328-1338
    • Furukawa, J.1    Imai, H.2
  • 13
    • 84982943258 scopus 로고
    • Non-Interactive and information-theoretic secure verifiable secret sharing
    • Feigenbaum J, ed. LNCS 576, Berlin: Springer-Verlag
    • Pedersen TP. Non-Interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum J, ed. Advances in Cryptology-CRYPTO'91. LNCS 576, Berlin: Springer-Verlag, 1992. 129-140.
    • (1992) Advances in Cryptology-CRYPTO'91 , pp. 129-140
    • Pedersen, T.P.1
  • 14
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Kaliski B, ed. LNCS 1296, Berlin: Springer-Verlag
    • Camenisch J, Stadler M. Efficient group signature schemes for large groups. In: Kaliski B, ed. Advances in Cryptology-CRYPTO'97. LNCS 1296, Berlin: Springer-Verlag, 1997. 410-424.
    • (1997) Advances in Cryptology-CRYPTO'97 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 15
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • LNCS 263, Berlin: Springer-Verlag
    • Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In: Proc. of the CRYPTO'86. LNCS 263, Berlin: Springer-Verlag, 1986. 186-194.
    • (1986) Proc. of the CRYPTO'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 16
    • 26444562547 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • Miyaji A, Nakabayashi M, Takano S. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. on Fundamentals, 2002, E85-A(2):481-484.
    • (2002) IEICE Trans. on Fundamentals , vol.E85-A , Issue.2 , pp. 481-484
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 18
    • 0342880858 scopus 로고
    • Studies in secure multiparty computation and applications
    • Rehovot: Weizmann Institute of Science
    • Canetti R. Studies in secure multiparty computation and applications [Ph.D. Thesis]. Rehovot: Weizmann Institute of Science, 1995.
    • (1995)
    • Canetti, R.1
  • 19
    • 0034447081 scopus 로고    scopus 로고
    • Composition and integrity preservation of secure reactive systems
    • Gritzalis D, Jajodia S, eds. New York: ACM Press
    • Pfitzmann B, Waidner M. Composition and integrity preservation of secure reactive systems. In: Gritzalis D, Jajodia S, eds. Proc. of the 7th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2000. 245-254.
    • (2000) Proc. of the 7th ACM Conf. on Computer and Communications Security , pp. 245-254
    • Pfitzmann, B.1    Waidner, M.2
  • 20
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • [doi: 10.1007/s001450010003]
    • Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3):361-396. [doi: 10.1007/s001450010003]
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.