메뉴 건너뛰기




Volumn 6123 LNCS, Issue , 2010, Pages 402-419

Affiliation-hiding key exchange with untrusted group authorities

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SCENARIO; AUTHENTICATED KEY AGREEMENT; AUTHENTICATED KEY EXCHANGE; GROUP MEMBERSHIPS; KEY EXCHANGE; MALICIOUS BEHAVIOR; P2P SYSTEM; PRIVACY PRESERVING; SOCIAL NETWORKING; TYPE OF SERVICES;

EID: 79956319822     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13708-2_24     Document Type: Conference Paper
Times cited : (15)

References (23)
  • 3
    • 84949210733 scopus 로고    scopus 로고
    • The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    • Syverson, P.F. (ed.) FC 2001. Springer, Heidelberg
    • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 309-328. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2339 , pp. 309-328
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 5
    • 84947778144 scopus 로고    scopus 로고
    • The Decision Diffie-Hellman Problem
    • Algorithmic Number Theory
    • Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-63. Springer, Heidelberg (1998) (Pubitemid 128093541)
    • (1998) LNCS , Issue.1423 , pp. 48-63
    • Boneh, D.1
  • 6
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Camenisch, J., Michels, M.: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
    • (2001) LNCS , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Plenum Press, New York
    • Chaum, D.: Blind Signatures for Untraceable Payments. In: CRYPTO 1982, pp. 199-203. Plenum Press, New York (1983)
    • (1983) CRYPTO 1982 , pp. 199-203
    • Chaum, D.1
  • 10
    • 84957695516 scopus 로고
    • Securing traceability of ciphertexts - Towards a secure software key escrow system (extended abstract)
    • Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. Springer, Heidelberg
    • Desmedt, Y.: Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 147-157. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.921 , pp. 147-157
    • Desmedt, Y.1
  • 11
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
    • Fiat, A., Shamir, A.: How To Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 12
    • 34547142883 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • Gennaro, R., Rabin, T., Jarecki, S., Krawczyk, H.: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3), 393 (2007)
    • (2007) J. Cryptology , vol.20 , Issue.3 , pp. 393
    • Gennaro, R.1    Rabin, T.2    Jarecki, S.3    Krawczyk, H.4
  • 13
    • 34547207796 scopus 로고    scopus 로고
    • RSA-based undeniable signatures
    • Gennaro, R., Rabin, T., Krawczyk, H.: RSA-Based Undeniable Signatures. J. Cryptology 20(3), 394 (2007)
    • (2007) J. Cryptology , vol.20 , Issue.3 , pp. 394
    • Gennaro, R.1    Rabin, T.2    Krawczyk, H.3
  • 14
    • 84867284322 scopus 로고    scopus 로고
    • Group secret handshakes or affiliation-hiding authenticated group key agreement
    • Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
    • Jarecki, S., Kim, J., Tsudik, G.: Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 287-308. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4377 , pp. 287-308
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 16
    • 38049060325 scopus 로고    scopus 로고
    • Unlinkable secret handshakes and key-private group key management schemes
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270-287. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 270-287
    • Jarecki, S.1    Liu, X.2
  • 17
    • 70350325165 scopus 로고    scopus 로고
    • Private mutual authentication and conditional oblivious transfer
    • Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Private Mutual Authentication and Conditional Oblivious Transfer. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 90-107. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 90-107
    • Jarecki, S.1    Liu, X.2
  • 18
    • 70350647637 scopus 로고    scopus 로고
    • Secret handshake: Strong anonymity definition and construction
    • Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. Springer, Heidelberg
    • Kawai, Y., Yoneyama, K., Ohta, K.: Secret Handshake: Strong Anonymity Definition and Construction. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 219-229. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5451 , pp. 219-229
    • Kawai, Y.1    Yoneyama, K.2    Ohta, K.3
  • 19
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
    • LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 1-16
    • Lamacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 20
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Pedersen, T.P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 21
    • 49049098105 scopus 로고    scopus 로고
    • A flexible framework for secret handshakes
    • Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
    • Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295-315. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4258 , pp. 295-315
    • Tsudik, G.1    Xu, S.2
  • 23
    • 14844289583 scopus 로고    scopus 로고
    • k-anonymous secret handshakes with reusable credentials
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Xu, S., Yung, M.: k-Anonymous Secret Handshakes with Reusable Credentials. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 158-167. ACM, New York (2004) (Pubitemid 40347107)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 158-167
    • Xu, S.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.