메뉴 건너뛰기




Volumn 14, Issue 1, 2011, Pages

Access controls for oblivious and anonymous systems

Author keywords

Access controls; Anonymous credentials; Oblivious transfer

Indexed keywords

ACCESS CONTROL MODELS; ADAPTIVE OBLIVIOUS TRANSFER; ANONYMOUS CREDENTIAL; ANONYMOUS CREDENTIAL SYSTEMS; ANONYMOUS SYSTEMS; CONSTANT TIME; CREDENTIAL SYSTEMS; CRYPTOGRAPHIC PROTOCOLS; DETRIMENTAL EFFECTS; MULTI-LEVEL SECURITY; OBLIVIOUS TRANSFER; SET-UP PHASE; STATE INFORMATION; STATE MACHINE; STATE MACHINE MODELS; SYSTEM MODELS; THE STANDARD MODEL; USER BEHAVIORS;

EID: 79959823641     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1952982.1952992     Document Type: Conference Paper
Times cited : (11)

References (51)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced Oblivious Transfer: How to Sell Digital Goods
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • AIELLO, W., ISHAI, Y., AND REINGOLD, O. 2001. Priced oblivious transfer: How to sell digital goods. In Advances in Cryptology (EUROCRYPT'01), Lecture Notes in Computer Science, vol. 2045, Springer, Berlin, 119-135. (Pubitemid 33275828)
    • (2001) Lecture Notes In Computer Science , Issue.2045 , pp. 119-135
    • Aiello, B.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 79959844386 scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • Bedford, MA
    • BELL, D. E. AND PADULA, L. J. L. 1988. Secure computer system: Unified exposition and Multics interpretation. MITRE Corp., Bedford, MA.
    • (1988) MITRE Corp
    • Bell, D.E.1    Padula, L.J.L.2
  • 5
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Lecture Notes in Computer Science, Springer, Berlin
    • BONEH, D. AND BOYEN, X. 2004. Short signatures without random oracles. In Advances in Cryptology (EUROCRYPT'04), Lecture Notes in Computer Science, vol. 3027, Springer, Berlin, 56-73.
    • (2004) Advances in Cryptology (EUROCRYPT'04) , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 6
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Lecture Notes in Computer Science, Springer, Berlin
    • BONEH, D.,BOYEN, X., AND SHACHAM,H. 2004. Short group signatures. In Advances in Cryptology (CRYPTO'04), Lecture Notes in Computer Science, vol. 3152, Springer, Berlin, 227-242.
    • (2004) Advances in Cryptology (CRYPTO'04) , vol.3152 , pp. 227-242
    • Boneh D.Boyen, X.1    Shacham, H.2
  • 7
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • Lecture Notes in Computer Science, Springer, Berlin
    • BOUDOT, F. 2000. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology (EUROCRYPT'00), Lecture Notes in Computer Science, vol. 1807, Springer, Berlin, 431-444.
    • (2000) Advances in Cryptology (EUROCRYPT'00) , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 8
    • 84957366640 scopus 로고    scopus 로고
    • Rapid demonstration of linear relations connected by boolean operators
    • Advances in Cryptology - Eurocrypt '97
    • BRANDS, S. 1997. Rapid demonstration of linear relations connected by boolean operators. In Advances in Cryptology (EUROCRYPT'97), Lecture Notes in Computer Science, vol. 1233. Springer, Berlin, 318-333. (Pubitemid 127067810)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 318-333
    • Brands, S.1
  • 10
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
    • Lecture Notes in Computer Science
    • CAMENISCH, J. AND DAMGARD, I. 2000. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In Advances in Cryptology (ASIACRYPT '00), Lecture Notes in Computer Science, vol. 1976, 331-345.
    • (2000) Advances in Cryptology (ASIACRYPT '00) , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgard, I.2
  • 12
    • 77955331156 scopus 로고    scopus 로고
    • Unlinkable priced oblivious transfer with rechargeable wallets
    • Lecture Notes in Computer Science, Springer, Berlin
    • CAMENISCH, J., DUBOVITSKAYA, M., AND NEVEN, G. 2010. Unlinkable priced oblivious transfer with rechargeable wallets. In Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 6052, Springer, Berlin.
    • (2010) Financial Cryptography and Data Security , vol.6052
    • Camenisch, J.1    Dubovitskaya, M.2    Neven, G.3
  • 14
    • 24944435537 scopus 로고    scopus 로고
    • Compact e-cash
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • CAMENISCH, J., HOHENBERGER, S., AND LYSYANSKAYA, A. 2005. Compact e-cash. In Advances in Cryptology (EUROCRYPT'05), Lecture Notes in Computer Science, vol. 3494, Springer, Berlin, 302-321. (Pubitemid 41313960)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 16
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Advances in Cryptology (EUROCRYPT'01), Lecture Notes in Computer Science, vol. 2045, Springer, Berlin, 93-118. (Pubitemid 33275827)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 17
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Lecture Notes in Computer Science, Springer, Berlin
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2003. A signature scheme with efficient protocols. In Security in Communication Networks, Lecture Notes in Computer Science, vol. 2576, Springer, Berlin, 268-289.
    • (2003) Security in Communication Networks , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 18
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Lecture Notes in Computer Science, Springer, Berlin
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2004. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology (CRYPTO'04), Lecture Notes in Computer Science, vol. 3152, Springer, Berlin, 56-72.
    • (2004) Advances in Cryptology (CRYPTO'04) , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 19
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • Lecture Notes in Computer Science, Springer, Berlin
    • CAMENISCH, J. AND MICHELS, M. 1999a. Proving in zero-knowledge that a number n is the product of two safe primes. In Advances in Cryptology (EUROCRYPT'99), Lecture Notes in Computer Science, vol. 1592, Springer, Berlin, 107-122.
    • (1999) Advances in Cryptology (EUROCRYPT'99) , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 20
    • 84921060028 scopus 로고    scopus 로고
    • Seperability and efficiency for generic group signature schemes
    • Lecture Notes in Computer Science, Springer, Berlin
    • CAMENISCH, J. AND MICHELS, M. 1999b. Seperability and efficiency for generic group signature schemes. In Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science, vol. 1666, Springer, Berlin, 413-430.
    • (1999) Advances in Cryptology (CRYPTO'99) , vol.1666 , pp. 413-430
    • Camenisch, J.1    Michels, M.2
  • 21
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • Lecture Notes in Computer Science, Springer, Berlin
    • CAMENISCH, J., NEVEN, G., AND SHELAT, A. 2007. Simulatable adaptive oblivious transfer. In Advances in Cryptology (EUROCRYPT'07), Lecture Notes in Computer Science, vol. 4515, Springer, Berlin, 573-590.
    • (2007) Advances in Cryptology (EUROCRYPT'07) , vol.4515 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    Shelat, A.3
  • 23
    • 84957661460 scopus 로고    scopus 로고
    • Easy come-easy go divisible cash
    • Lecture Notes in Computer Science, Springer, Berlin
    • CHAN, A., FRANKEL, Y., AND TSIOUNIS, Y. 1998. Easy come-easy go divisible cash. In Advances in Cryptology (EUROCRYPT'98), Lecture Notes in Computer Science, vol. 1403, Springer, Berlin, 561-575.
    • (1998) Advances in Cryptology (EUROCRYPT'98) , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 24
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • DOI 10.1145/4372.4373
    • CHAUM, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Comm. ACM 28,10, 1030-1044. (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum David1
  • 25
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Lecture Notes in Computer Science, Springer, Berlin
    • CHAUM, D. AND PEDERSEN, T. P. 1992.Wallet databases with observers. In Advances in Cryptology (CRYPTO'92), Lecture Notes in Computer Science, vol. 740, Springer, Berlin, 89-105.
    • (1992) Advances in Cryptology (CRYPTO'92) , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 28
    • 84957802212 scopus 로고    scopus 로고
    • Efficient zero-knowledge proofs of knowledge without intractability assumptions
    • Lecture Notes in Computer Science
    • CRAMER, R., DAMGARD, I., AND MACKENZIE, P. 2000. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In Public Key Cryptography, Lecture Notes in Computer Science, vol. 1751, 354-372.
    • (2000) Public Key Cryptography , vol.1751 , pp. 354-372
    • Cramer, R.1    Damgard, I.2    Mackenzie, P.3
  • 29
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Lecture Notes in Computer Science, Springer, Berlin
    • CRAMER, R., DAMGARD, I., AND SCHOENMAKERS, B. 1994. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology (CRYPTO'94), Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 174-187.
    • (1994) Advances in Cryptology (CRYPTO'94) , vol.839 , pp. 174-187
    • Cramer, R.1    Damgard, I.2    Schoenmakers, B.3
  • 30
    • 84957690041 scopus 로고    scopus 로고
    • Conditional oblivious transfer and time released encryption
    • Lecture Notes in Computer Science, Springer, Berlin
    • CRESCENZO, G. D., OSTROVSKY, R., AND RAJAGOPOLAN, S. 1999. Conditional oblivious transfer and time released encryption. In Advances in Cryptology (EUROCRYPT'99), Lecture Notes in Computer Science, vol. 1592, Springer, Berlin, 74-89.
    • (1999) Advances in Cryptology (EUROCRYPT'99) , vol.1592 , pp. 74-89
    • Crescenzo, G.D.1    Ostrovsky, R.2    Rajagopolan, S.3
  • 31
    • 84958774556 scopus 로고    scopus 로고
    • An integer commitment scheme based on groups with hidden order
    • Lecture Notes in Computer Science, Springer, Berlin
    • DAMGARD, I. AND FUJISAKI, E. 2002. An integer commitment scheme based on groups with hidden order. In Advances in Cryptology (ASIACRYPT'02), Lecture Notes in Computer Science, vol. 2501, Springer, Berlin, 125-142.
    • (2002) Advances in Cryptology (ASIACRYPT'02) , vol.2501 , pp. 125-142
    • Damgard, I.1    Fujisaki, E.2
  • 33
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • DODIS, Y. AND YAMPOLSKIY, A. 2005. A verifiable random function with short proofs and keys. In Public Key Cryptology (PKC'05), Lecture Notes in Computer Science, vol. 3386. Springer, Berlin, 416-431. (Pubitemid 41231346)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 34
    • 67049158194 scopus 로고    scopus 로고
    • Security of blind signatures under aborts
    • Lecture Notes in Computer Science, Springer, Berlin
    • FISCHLIN, M. AND SCHRODER, D. 2009. Security of blind signatures under aborts. In Public Key Cryptography (PKC'09), Lecture Notes in Computer Science, vol. 5443, Springer, Berlin, 297-316.
    • (2009) Public Key Cryptography (PKC'09) , vol.5443 , pp. 297-316
    • Fischlin, M.1    Schroder, D.2
  • 35
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • Advances in Cryptology - CRYPTO '97
    • FUJISAKI, E. AND OKAMOTO, T. 1997. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology (CRYPTO'97), Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, 16-30. (Pubitemid 127112542)
    • (1997) Lecture Notes in Computer Science , Issue.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 36
    • 0022793132 scopus 로고
    • How to construct
    • random functions
    • GOLDREICH, O.,GOLDWASSER, S., ANDMICALI, S. 1986. How to construct random functions. J. ACM33, 4, 792-807.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Andmicali, S.3
  • 38
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosenmessage attacks
    • GOLDWASSER, S.,MICALI, S., AND RIVEST, R. L. 1988. A digital signature scheme secure against adaptive chosenmessage attacks. SIAM J. Comput. 17, 2, 281-308.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 39
    • 79959845165 scopus 로고    scopus 로고
    • GOOGLE. Google Health
    • GOOGLE. 2009. Google Health. https://www.google.com/health.
    • (2009)
  • 40
    • 38149091799 scopus 로고    scopus 로고
    • Blind identity-based encryption and simulatable oblivious transfer
    • Lecture Notes in Computer Science, Springer, Berlin
    • GREEN, M. AND HOHENBERGER, S. 2007. Blind identity-based encryption and simulatable oblivious transfer. In Advances in Cryptology (ASIACRYPT'07), Lecture Notes in Computer Science, vol. 4833, Springer, Berlin, 265-282.
    • (2007) Advances in Cryptology (ASIACRYPT'07) , vol.4833 , pp. 265-282
    • Green, M.1    Hohenberger, S.2
  • 41
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
    • Lecture Notes in Computer Science, Springer, Berlin
    • JARECKI, S. AND LIU, X. 2009. Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In Theory of Cryptography, Lecture Notes in Computer Science, vol. 5444, Springer, Berlin, 577-594.
    • (2009) Theory of Cryptography , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 44
    • 79959836490 scopus 로고    scopus 로고
    • MICROSOFT. Microsoft HealthVault
    • MICROSOFT. 2009. Microsoft HealthVault. http://www.healthvault.com/.
    • (2009)
  • 45
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • Lecture Notes in Computer Science, Springer, Berlin
    • NAOR, M. AND PINKAS, B. 1999. Oblivious transfer with adaptive queries. In Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science, vol. 1666, Springer, Berlin, 573-590.
    • (1999) Advances in Cryptology (CRYPTO'99) , vol.1666 , pp. 573-590
    • Naor, M.1    Pinkas, B.2
  • 47
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keyword search. Special issue on coding and cryptography
    • OGATA, W. AND KUROSAWA, K. 2004. Oblivious keyword search. Special issue on coding and cryptography. J. Complexity 20, 2-3, 356-371.
    • (2004) J. Complexity , vol.20 , Issue.2-3 , pp. 356-371
    • Ogata, W.1    Kurosawa, K.2
  • 48
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Lecture Notes in Computer Science, Springer, Berlin
    • PEDERSEN, T. P. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology (CRYPTO'92). Lecture Notes in Computer Science, vol. 576, Springer, Berlin, 129-140.
    • (1992) Advances in Cryptology (CRYPTO'92) , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 49
    • 0000089246 scopus 로고
    • Efficient signature generation for smart cards
    • SCHNORR, C.-P. 1991. Efficient signature generation for smart cards. J. Cryptology 4, 3, 239-252.
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.-P.1
  • 50
    • 35048839792 scopus 로고    scopus 로고
    • K-times anonymous authentication
    • Lecture Notes in Computer Science, Springer, Berlin
    • TERANISHI, I., FURUKAWA, J., AND SAKO, K. 2004. k-times anonymous authentication. In Advances in Cryptology (ASIACRYPT'04), Lecture Notes in Computer Science, vol. 3329, Springer, Berlin, 308-322.
    • (2004) Advances in Cryptology (ASIACRYPT'04) , vol.3329 , pp. 308-322
    • Teranishi, I.1    Furukawa, J.2    Sako, K.3
  • 51
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • WATERS, B. 2005. Efficient identity-based encryption without random oracles. In Advances in Cryptology (EUROCRYPT'05), Lecture Notes in Computer Science, vol. 3494, Springer, Berlin, 114-127. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.