메뉴 건너뛰기




Volumn 6571 LNCS, Issue , 2011, Pages 192-209

Oblivious transfer with hidden access control policies

Author keywords

Access Control; Anonymous Credentials; Oblivious Transfer; Privacy

Indexed keywords

ACCESS CONTROL POLICIES; ANONYMOUS CREDENTIAL; DATABASE RECORDS; DATABASE STRUCTURES; OBLIVIOUS TRANSFER; PRIVACY; USER NEED;

EID: 79952510570     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19379-8_12     Document Type: Conference Paper
Times cited : (38)

References (28)
  • 2
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M. (ed.) CRYPTO 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 3
    • 69949124606 scopus 로고    scopus 로고
    • Randomizable proofs and delegatable anonymous credentials
    • Halevi, S. (ed.) CRYPTO 2009, Springer, Heidelberg
    • Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108-125. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 108-125
    • Belenkiy, M.1    Camenisch, J.2    Chase, M.3    Kohlweiss, M.4    Lysyanskaya, A.5    Shacham, H.6
  • 4
    • 14844297757 scopus 로고    scopus 로고
    • Concealing complex policies with hidden credentials
    • ACM Press, New York
    • Bradshaw, R.W., Holt, J.E., Seamons, K.E.: Concealing complex policies with hidden credentials. In: 11th (CCS 2004), pp. 46-157. ACM Press, New York (2004)
    • (2004) 11th (CCS 2004) , pp. 46-157
    • Bradshaw, R.W.1    Holt, J.E.2    Seamons, K.E.3
  • 6
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • Canetti, R.: Security and composition of multi-party cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 67650691588 scopus 로고    scopus 로고
    • A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
    • Joux, A. (ed.) EUROCRYPT 2009, Springer, Heidelberg
    • Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 351-368
    • Camenisch, J.1    Chandran, N.2    Shoup, V.3
  • 8
    • 74049137084 scopus 로고    scopus 로고
    • Oblivious transfer with access control
    • ACM Press, New York
    • Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious transfer with access control. In: ACM CCS 2009, pp. 131-140. ACM Press, New York (2009)
    • (2009) ACM CCS 2009 , pp. 131-140
    • Camenisch, J.1    Dubovitskaya, M.2    Neven, G.3
  • 9
    • 67049100253 scopus 로고    scopus 로고
    • Controlling access to an oblivious database using stateful anonymous credentials
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009, Springer, Heidelberg
    • Coull, S., Green, M., Hohenberger, S.: Controlling access to an oblivious database using stateful anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 501-520. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 501-520
    • Coull, S.1    Green, M.2    Hohenberger, S.3
  • 10
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M. (ed.) CRYPTO 2004, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • Naor, M. (ed.) EUROCRYPT 2007, Springer, Heidelberg
    • Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    Shelat, A.3
  • 13
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005) (Pubitemid 41231346)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 14
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469-472 (1985)
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 15
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-based access control with hidden policies and hidden credentials
    • DOI 10.1109/TC.2006.158
    • Frikken, K.B., Atallah, M.J., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Trans. Computers 55(10), 1259-1270 (2006) (Pubitemid 44355937)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.10 , pp. 1259-1270
    • Frikken, K.1    Atallah, M.2    Li, J.3
  • 19
    • 84893110297 scopus 로고    scopus 로고
    • Towards practical automated trust negotiation
    • Washington, DC, USA, IEEE Computer Society, Los Alamitos
    • Li, N., Winsborough, W.: Towards practical automated trust negotiation. In: POLICY 2002, Washington, DC, USA, p. 92. IEEE Computer Society, Los Alamitos (2002)
    • (2002) POLICY 2002 , pp. 92
    • Li, N.1    Winsborough, W.2
  • 20
    • 67049119911 scopus 로고    scopus 로고
    • Revocable group signature schemes with constant costs for signing and verifying
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009, Springer, Heidelberg
    • Nakanishi, T., Fujii, H., Hira, Y., Funabiki, N.: Revocable group signature schemes with constant costs for signing and verifying. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 463-480. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 463-480
    • Nakanishi, T.1    Fujii, H.2    Hira, Y.3    Funabiki, N.4
  • 21
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • Wiener, M. (ed.) CRYPTO 1999, Springer, Heidelberg
    • Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573-590. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 573-590
    • Naor, M.1    Pinkas, B.2
  • 24
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Harvard Aiken Computation Laboratory
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory (1981)
    • (1981) Technical Report TR-81
    • Rabin, M.O.1
  • 25
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • IEEE Computer Society Press, Los Alamitos
    • Yao, A.C.: Protocols for secure computations. In: 23rd FOCS, pp. 160-164. IEEE Computer Society Press, Los Alamitos (1982)
    • (1982) 23rd FOCS , pp. 160-164
    • Yao, A.C.1
  • 26
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • USA IEEE Computer Society, Los Alamitos
    • Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: IEEE Symposium on Security and Privacy (S&P 2003), USA, pp. 110-122. IEEE Computer Society, Los Alamitos (2003)
    • (2003) IEEE Symposium on Security and Privacy (S&P 2003) , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 28
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • Pfitzmann, B. (ed.) EUROCRYPT 2001, Springer, Heidelberg
    • Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 119. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 119
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.