메뉴 건너뛰기




Volumn 181, Issue 13, 2011, Pages 2906-2921

Privacy preservation with X.509 standard certificates

Author keywords

Formal analysis; Information and knowledge; Intelligent systems; Privacy preservation; Security algorithm

Indexed keywords

ATTRIBUTE CERTIFICATE; CERTIFICATE AUTHORITY; COMPUTING ENVIRONMENTS; CONCRETE METHOD; FORMAL ANALYSIS; INFORMATION AND KNOWLEDGE; LEGACY INFORMATION SYSTEMS; PRACTICAL METHOD; PRIVACY PRESERVATION; SECURITY ALGORITHM; TRUSTED THIRD PARTIES;

EID: 79953837784     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2011.02.016     Document Type: Article
Times cited : (18)

References (37)
  • 1
    • 3142707519 scopus 로고    scopus 로고
    • Efficient, self-contained handling of identity in peer-to-peer systems
    • K. Aberer, A. Datta, and M. Hauswirth Efficient, self-contained handling of identity in peer-to-peer systems IEEE Trans. Knowl. Data Eng. 16 7 2004 858 869
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , Issue.7 , pp. 858-869
    • Aberer, K.1    Datta, A.2    Hauswirth, M.3
  • 3
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • Springer-verlag
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik A practical and provably secure coalition-resistant group signature scheme Proceedings of Crypto 2000 - Advances in Cryptology Lecture Notes in Computer Science vol. 1880 2000 Springer-verlag 255 270
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 5
    • 35048903552 scopus 로고    scopus 로고
    • A first approach to provide anonymity in attribute certificates
    • Springer-Verlag
    • V. Benjumea, J. Lopez, J. Montegegro, and J. Troya A first approach to provide anonymity in attribute certificates Proceedings of PKC 2004 Lecture Notes in Computer Science vol. 2947 2004 Springer-Verlag 402 415
    • (2004) Lecture Notes in Computer Science , vol.2947 , pp. 402-415
    • Benjumea, V.1    Lopez, J.2    Montegegro, J.3    Troya, J.4
  • 6
    • 33646356748 scopus 로고    scopus 로고
    • Anonymous attribute certificates based on traceable signatures
    • DOI 10.1108/10662240610656474
    • V. Benjumea, J. Lopez, J. Montegegro, and J. Troya Anonymous attribute certificates based on traceable signatures J. Int. Res. 16 2 2006 120 139 (Pubitemid 43665934)
    • (2006) Internet Research , vol.16 , Issue.2 , pp. 120-139
    • Benjumea, V.1    Lopez, J.2    Troya, J.M.3
  • 7
    • 85085717196 scopus 로고    scopus 로고
    • Anonymity 2.0 X.509 extensions supporting privacy-friendly authentication
    • Springer-Verlag
    • V. Benjumea, S. Choi, J. Lopez, and M. Yung Anonymity 2.0 X.509 extensions supporting privacy-friendly authentication Proceedings of CANS 2007 Lecture Notes in Computer Science vol. 2947 2007 Springer-Verlag 402 415
    • (2007) Lecture Notes in Computer Science , vol.2947 , pp. 402-415
    • Benjumea, V.1    Choi, S.2    Lopez, J.3    Yung, M.4
  • 11
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • J. Camenisch, and A. Lysyanskaya Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation Proceedings of Eurocrypt 2001 - Advances in Cryptology Lecture Notes in Computer Science vol. 2045 2001 Springer-Verlag 93 118 (Pubitemid 33275827)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 4 2 1981 84 88 (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 13
    • 0001604533 scopus 로고
    • Blind signatures for untraceable system
    • Plenum Press
    • D. Chaum Blind signatures for untraceable system Proceedings of Crypto'82 - Advances in Cryptology Lecture Notes in Computer Science 1983 Plenum Press 100 203
    • (1983) Lecture Notes in Computer Science , pp. 100-203
    • Chaum, D.1
  • 14
    • 0022145479 scopus 로고
    • Security without identification: Transactions systems to make big brother obsolete
    • Revised version
    • D. Chaum Security without identification: transactions systems to make big brother obsolete Commun. ACM 28 10 1985 1035 1044 Revised version, Security Without Identification: Card Computers to Make Big Brother Obsolete, available at
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1035-1044
    • Chaum, D.1
  • 15
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • Springer-Verlag
    • D. Chaum, and J. Evertse A secure and privacy-protecting protocol for transmitting personal information between organizations Proceedings of Crypto'86 - Advances in Cryptology Lecture Notes in Computer Science vol. 263 1987 Springer-Verlag 118 167
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.2
  • 16
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Springer-Verlag
    • J. Coron On the exact security of full domain hash Proceedings of Crypto 2000 - Advances in Cryptology Lecture Notes in Computer Science vol. 1880 2000 Springer-Verlag 229 235
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 229-235
    • Coron, J.1
  • 17
    • 85031802442 scopus 로고
    • Payment systems and credential mechanism with provable security against abuse by individuals
    • Springer-Verlag
    • I. Damgrd Payment systems and credential mechanism with provable security against abuse by individuals Proceedings Crypto'88 - Advances in Cryptology Lecture Notes in Computer Science vol. 403 1988 Springer-Verlag 328 335
    • (1988) Lecture Notes in Computer Science , vol.403 , pp. 328-335
    • Damgrd, I.1
  • 19
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • D. Goldschlag, M. Reed, and P. Syverson Onion routing for anonymous and private internet connections Commun. ACM 42 2 1999 84 88
    • (1999) Commun. ACM , vol.42 , Issue.2 , pp. 84-88
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 21
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest A digital signature scheme secure against adaptive chosen-message attacks SIAM J. Comput. 17 2 1988 281 308
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 22
    • 38049167090 scopus 로고    scopus 로고
    • Reflecting on X.509 and LDAP, or How Separating Identity and Attributes Could Simplify a PKI
    • J. Graaf, O. Carvalho, Reflecting on X.509 and LDAP, or how separating identity and attributes could simplify A PKI, in: Proceedings of WSEG 2004, 2004, pp. 37-48.
    • (2004) Proceedings of WSEG 2004 , pp. 37-48
    • Graaf, J.1    Carvalho, O.2
  • 24
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • Springer-Verlag
    • A. Kiayias, Y. Tsiounis, and M. Yung Traceable signatures Proceedings of Eurocrypt 2004 - Advances in Cryptology Lecture Notes in Computer Science vol. 3027 1999 Springer-Verlag 571 589
    • (1999) Lecture Notes in Computer Science , vol.3027 , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 25
    • 38049165166 scopus 로고    scopus 로고
    • Privacy protection in pkis: A separation-of-authority approach
    • Springer-Verlag
    • T. Kwon, J. Cheon, Y. Kim, and J. Lee Privacy protection in pkis: a separation-of-authority approach Proceedings of WISA 2006 Lecture Notes in Computer Science vol. 4298 2007 Springer-Verlag 297 311
    • (2007) Lecture Notes in Computer Science , vol.4298 , pp. 297-311
    • Kwon, T.1    Cheon, J.2    Kim, Y.3    Lee, J.4
  • 26
    • 35748948981 scopus 로고    scopus 로고
    • New (t, n) threshold directed signature scheme with provable security
    • DOI 10.1016/j.ins.2007.07.025, PII S002002550700374X, "Ambient Intelligence"
    • R. Lu, X. Lin, Z. Cao, J. Shao, and X. Liang New (t, n) threshold directed signature scheme with provable security Information Sciences vol. 178 2008 Elsevier 756 765 (Pubitemid 350050957)
    • (2008) Information Sciences , vol.178 , Issue.3 , pp. 756-765
    • Lu, R.1    Lin, X.2    Cao, Z.3    Shao, J.4    Liang, X.5
  • 32
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signature and public-key cryptosystems Commun. ACM 21 2 1978 120 126 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 34
    • 67349124845 scopus 로고    scopus 로고
    • Specification and enforcement of flexible security policy for active cooperation
    • Elsevier
    • Y. Sun, B. Gong, X. Meng, Z. Lin, and E. Bertino Specification and enforcement of flexible security policy for active cooperation Information Sciences vol. 179 2009 Elsevier 2629 2642
    • (2009) Information Sciences , vol.179 , pp. 2629-2642
    • Sun, Y.1    Gong, B.2    Meng, X.3    Lin, Z.4    Bertino, E.5
  • 35
    • 84946849368 scopus 로고    scopus 로고
    • Self-blindable credential certificates from the weil pairing
    • Springer-Verlag
    • E. Verheul Self-blindable credential certificates from the weil pairing Proceedings of Asiacrypt 2001 - Advances in Cryptology Lecture Notes in Computer Science vol. 2248 2001 Springer-Verlag 533 551
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 533-551
    • Verheul, E.1
  • 37
    • 78449305489 scopus 로고    scopus 로고
    • Forward-secure identity-based signature: Security notions and construction
    • Elsevier
    • J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen Forward-secure identity-based signature: security notions and construction Information Sciences vol. 181 2011 Elsevier 648 660
    • (2011) Information Sciences , vol.181 , pp. 648-660
    • Yu, J.1    Hao, R.2    Kong, F.3    Cheng, X.4    Fan, J.5    Chen, Y.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.