메뉴 건너뛰기




Volumn , Issue , 2011, Pages 286-295

Practical affiliation-hiding authentication from improved polynomial interpolation

Author keywords

Affiliation hiding authentication; IHME; Polynomial interpolation; Privacy preserving protocols

Indexed keywords

INTERPOLATION; POLYNOMIALS; PRIVACY-PRESERVING TECHNIQUES;

EID: 79956049882     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966950     Document Type: Conference Paper
Times cited : (6)

References (31)
  • 3
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • volume 2656 of LNCS, Springer
    • M. Bellare, D. Micciancio, and B. Warinschi. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In EUROCRYPT 2003, volume 2656 of LNCS, pages 614-629. Springer, 2003.
    • (2003) EUROCRYPT 2003 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 4
    • 84968468488 scopus 로고
    • Solution of vandermonde systems of equations
    • A. Björck and V. Pereyra. Solution of Vandermonde Systems of Equations. Mathematics of Computation, 24(112):893-903, 1970.
    • (1970) Mathematics of Computation , vol.24 , Issue.112 , pp. 893-903
    • Björck, A.1    Pereyra, V.2
  • 7
    • 85024290278 scopus 로고
    • Group signatures
    • volume 547 of LNCS, Springer
    • D. Chaum and E. van Heyst. Group Signatures. In EUROCRYPT 1991, volume 547 of LNCS, pages 257-265. Springer, 1991.
    • (1991) EUROCRYPT 1991 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 10
    • 85175130443 scopus 로고    scopus 로고
    • Facebook's Statistics. http://www.facebook.com/press/info.php?statistics.
    • Facebook's Statistics
  • 11
    • 79956318444 scopus 로고    scopus 로고
    • Okamoto-tanaka revisited: Fully authenticated diffie-hellman with minimal overhead
    • volume 6123 of LNCS, Springer
    • R. Gennaro, H. Krawczyk, and T. Rabin. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. In ACNS 2010, volume 6123 of LNCS, pages 309-328. Springer, 2010.
    • (2010) ACNS 2010 , pp. 309-328
    • Gennaro, R.1    Krawczyk, H.2    Rabin, T.3
  • 12
    • 17444362761 scopus 로고    scopus 로고
    • On the security of modular exponentiation with application to the construction of pseudorandom generators
    • DOI 10.1007/s00145-002-0038-7
    • O. Goldreich and V. Rosen. On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators. J. Cryptology, 16(2):71-93, 2003. (Pubitemid 41201210)
    • (2003) Journal of Cryptology , vol.16 , Issue.2 , pp. 71-93
    • Goldreich, O.1    Rosen, V.2
  • 14
    • 84867284322 scopus 로고    scopus 로고
    • Group secret handshakes or affiliation-hiding authenticated group key agreement
    • volume 4377 of LNCS, Springer
    • S. Jarecki, J. Kim, and G. Tsudik. Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement. In CT-RSA 2007, volume 4377 of LNCS, pages 287-308. Springer, 2007.
    • (2007) CT-RSA 2007 , pp. 287-308
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 16
    • 38049060325 scopus 로고    scopus 로고
    • Unlinkable secret handshakes and key-private group key management schemes
    • volume 4521 of LNCS, Springer
    • S. Jarecki and X. Liu. Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In ACNS 2007, volume 4521 of LNCS, pages 270-287. Springer, 2007.
    • (2007) ACNS 2007 , pp. 270-287
    • Jarecki, S.1    Liu, X.2
  • 17
    • 49049101312 scopus 로고    scopus 로고
    • Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials
    • volume 5126 of LNCS, Springer
    • S. Jarecki and X. Liu. Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. In ICALP (2), volume 5126 of LNCS, pages 715-726. Springer, 2008.
    • (2008) ICALP (2) , pp. 715-726
    • Jarecki, S.1    Liu, X.2
  • 18
    • 70350325165 scopus 로고    scopus 로고
    • Private mutual authentication and conditional oblivious transfer
    • volume 5677 of LNCS, Springer
    • S. Jarecki and X. Liu. Private Mutual Authentication and Conditional Oblivious Transfer. In CRYPTO 2009, volume 5677 of LNCS, pages 90-107. Springer, 2009.
    • (2009) CRYPTO 2009 , pp. 90-107
    • Jarecki, S.1    Liu, X.2
  • 19
    • 1442332544 scopus 로고    scopus 로고
    • Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1
    • J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 (RFC 3447), 2003.
    • (2003) RFC , vol.3447
    • Jonsson, J.1    Kaliski, B.2
  • 21
    • 79956319602 scopus 로고    scopus 로고
    • Privacy-preserving group discovery with linear complexity
    • volume 6123 of LNCS, Springer
    • M. Manulis, B. Pinkas, and B. Poettering. Privacy-Preserving Group Discovery with Linear Complexity. In ACNS 2010, volume 6123 of LNCS, pages 420-437. Springer, 2010.
    • (2010) ACNS 2010 , pp. 420-437
    • Manulis, M.1    Pinkas, B.2    Poettering, B.3
  • 22
    • 79956319822 scopus 로고    scopus 로고
    • Affiliation-hiding key exchange with untrusted group authorities
    • volume 6123 of LNCS, Springer
    • M. Manulis, B. Poettering, and G. Tsudik. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. In ACNS 2010, volume 6123 of LNCS, pages 402-419. Springer, 2010.
    • (2010) ACNS 2010 , pp. 402-419
    • Manulis, M.1    Poettering, B.2    Tsudik, G.3
  • 23
    • 77955440831 scopus 로고    scopus 로고
    • Taming big brother ambitions: More privacy for secret handshakes
    • volume 6205 of LNCS, Springer
    • M. Manulis, B. Poettering, and G. Tsudik. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. In PETS 2010, volume 6205 of LNCS, pages 149-165. Springer, 2010.
    • (2010) PETS 2010 , pp. 149-165
    • Manulis, M.1    Poettering, B.2    Tsudik, G.3
  • 25
    • 84968484435 scopus 로고
    • Speeding the pollard and elliptic curve methods of factorization
    • P. L. Montgomery. Speeding the Pollard and Elliptic Curve Methods of Factorization. Mathematics of Computation, 48(177):243-264, 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 26
    • 33751508709 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST). SP 800-57 Part 1
    • National Institute of Standards and Technology (NIST). SP 800-57 Part 1, Recommendation for Key Management, 2007.
    • (2007) Recommendation for Key Management
  • 28
    • 49049098105 scopus 로고    scopus 로고
    • A flexible framework for secret handshakes
    • volume 4258 of LNCS, Springer
    • G. Tsudik and S. Xu. A Flexible Framework for Secret Handshakes. In PETS 2006, volume 4258 of LNCS, pages 295-315. Springer, 2006.
    • (2006) PETS 2006 , pp. 295-315
    • Tsudik, G.1    Xu, S.2
  • 30
    • 33947133548 scopus 로고
    • On the numerical inversion of a recurrent problem: The vandermonde matrix
    • H. J. Wertz. On the Numerical Inversion of a Recurrent Problem: The Vandermonde Matrix. In IEEE Transactions on Automatic Control, 1965.
    • (1965) IEEE Transactions on Automatic Control
    • Wertz, H.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.