메뉴 건너뛰기




Volumn , Issue , 2011, Pages 523-537

Extending nymble-like systems

Author keywords

Anonymity; Anonymous blacklisting; Authentication; Privacy enhancing technologies; Privacy enhanced revocation

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DATA PRIVACY; INTERNET SERVICE PROVIDERS; NETWORK SECURITY;

EID: 80051993885     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.17     Document Type: Conference Paper
Times cited : (6)

References (36)
  • 1
    • 5744224341 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • Espoo, Finland, May
    • M. Bellare, J. A. Garay, and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures," in Proceedings of EUROCRYPT 1998, Espoo, Finland, May 1998.
    • (1998) Proceedings of EUROCRYPT 1998
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 2
    • 80051991255 scopus 로고
    • Restrictive blinding of secret-key certificates
    • Saint-Malo, France, May
    • S. Brands, "Restrictive Blinding of Secret-Key Certificates," in Proceedings of EUROCRYPT 1995, Saint-Malo, France, May 1995.
    • (1995) Proceedings of EUROCRYPT 1995
    • Brands, S.1
  • 4
    • 36248946672 scopus 로고    scopus 로고
    • A practical system for globally revoking the unlinkable pseudonyms of unknown users
    • Department of Computer Science
    • S. A. Brands, L. Demuynck, and B. D. Decker, "A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users." Department of Computer Science, K.U. Leuven, Technical Report CW472, 2006.
    • (2006) K.U. Leuven, Technical Report CW472
    • Brands, S.A.1    Demuynck, L.2    Decker, B.D.3
  • 5
    • 85177664417 scopus 로고    scopus 로고
    • A practical system for globally revoking the unlinkable pseudonyms of unknown users
    • Townsville, Australia, July
    • S. A. Brands, L. Demuynck, and B. D. Decker, "A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users," in Proceedings of ACISP 2007, Townsville, Australia, July 2007.
    • (2007) Proceedings of ACISP 2007
    • Brands, S.A.1    Demuynck, L.2    Decker, B.D.3
  • 6
    • 56649119348 scopus 로고    scopus 로고
    • Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
    • Alexandria, VA, October
    • E. Brickell and J. Li, "Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities," in Proceedings of WPES 2007, Alexandria, VA, October 2007.
    • (2007) Proceedings of WPES 2007
    • Brickell, E.1    Li, J.2
  • 7
    • 14844283355 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Santa Barbara, CA, August
    • J. Camenisch and V. Shoup, "Practical Verifiable Encryption and Decryption of Discrete Logarithms," in Proceedings of CRYPTO 2003, Santa Barbara, CA, August 2003.
    • (2003) Proceedings of CRYPTO 2003
    • Camenisch, J.1    Shoup, V.2
  • 8
    • 0002882557 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups (Extended abstract)
    • Santa Barbara, CA, August
    • J. Camenisch and M. Stadler, "Efficient Group Signature Schemes for Large Groups (Extended Abstract)," in Proceedings of CRYPTO 1997, Santa Barbara, CA, August 1997.
    • (1997) Proceedings of CRYPTO 1997
    • Camenisch, J.1    Stadler, M.2
  • 9
    • 84869776039 scopus 로고    scopus 로고
    • Practical threshold RSA signatures without a trusted dealer
    • Innsbruck, Austria, May
    • I. Damgård and M. Koprowski, "Practical Threshold RSA Signatures without a Trusted Dealer," in Proceedings of EUROCRYPT 2001, Innsbruck, Austria, May 2001.
    • (2001) Proceedings of EUROCRYPT 2001
    • Damgård, I.1    Koprowski, M.2
  • 13
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • Los Angeles, CA, October
    • P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing," in Proceedings of FOCS 1987, Los Angeles, CA, October 1987.
    • (1987) Proceedings of FOCS 1987
    • Feldman, P.1
  • 14
    • 3142697332 scopus 로고    scopus 로고
    • Fully distributed threshold RSA under standard assumptions
    • Gold Coast, Australia, December
    • P.-A. Fouque and J. Stern, "Fully Distributed Threshold RSA under Standard Assumptions," in Proceedings of ASIACRYPT 2001, Gold Coast, Australia, December 2001.
    • (2001) Proceedings of ASIACRYPT 2001
    • Fouque, P.-A.1    Stern, J.2
  • 17
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. L. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks," SIAM Journal on Computing (SICOMP), vol. 17, no. 2, pp. 281-308, April 1988.
    • (1988) SIAM Journal on Computing (SICOMP) , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 18
    • 80051954287 scopus 로고    scopus 로고
    • Formalizing anonymous blacklisting systems
    • Oakland, CA, May
    • R. Henry and I. Goldberg, "Formalizing Anonymous Blacklisting Systems," in Proceedings of IEEE S&P 2011, Oakland, CA, May 2011.
    • (2011) Proceedings of IEEE S&P 2011
    • Henry, R.1    Goldberg, I.2
  • 22
    • 85177686128 scopus 로고    scopus 로고
    • Jack: Scalable accumulator-based nymble system
    • Chicago, IL, October
    • Z. Lin and N. Hopper, "Jack: Scalable Accumulator-based Nymble System," in Proceedings of WPES 2010, Chicago, IL, October 2010.
    • (2010) Proceedings of WPES 2010
    • Lin, Z.1    Hopper, N.2
  • 23
    • 80051993744 scopus 로고    scopus 로고
    • BNymble (A short paper): More anonymous blacklisting at almost no cost
    • St. Lucia, February
    • P. Lofgren and N. Hopper, "BNymble (A Short Paper): More Anonymous Blacklisting at Almost No Cost," in Proceedings of FC 2011, St. Lucia, February 2011.
    • (2011) Proceedings of FC 2011
    • Lofgren, P.1    Hopper, N.2
  • 26
    • 0000845043 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Santa Barbara, CA, August
    • T. P. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," in Proceedings of CRYPTO 1991, Santa Barbara, CA, August 1991.
    • (1991) Proceedings of CRYPTO 1991
    • Pedersen, T.P.1
  • 28
    • 85177676898 scopus 로고    scopus 로고
    • Master's thesis, Information Networking Institute, Carnegie Mellon
    • E. J. Schwartz, "Contractual Anonymity," Master's thesis, Information Networking Institute, Carnegie Mellon, 2009.
    • (2009) Contractual Anonymity
    • Schwartz, E.J.1
  • 31
    • 0001000209 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Bruges, Belgium, May
    • V. Shoup, "Practical Threshold Signatures," in Proceedings of EUROCRYPT 2000, Bruges, Belgium, May 2000.
    • (2000) Proceedings of EUROCRYPT 2000
    • Shoup, V.1
  • 32
    • 77952377083 scopus 로고    scopus 로고
    • Blacklistable anonymous credentials: Blocking misbehaving users without TTPs
    • Alexandria, VA, October
    • P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users Without TTPs," in Proceedings of CCS 2007, Alexandria, VA, October 2007.
    • (2007) Proceedings of CCS 2007
    • Tsang, P.P.1    Au, M.H.2    Kapadia, A.3    Smith, S.W.4
  • 33
    • 70349290797 scopus 로고    scopus 로고
    • PEREA: Towards practical TTP-free revocation in anonymous authentication
    • Alexandria, VA, October
    • P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith, "PEREA: Towards Practical TTP-free Revocation in Anonymous Authentication," in Proceedings of CCS 2008, Alexandria, VA, October 2008.
    • (2008) Proceedings of CCS 2008
    • Tsang, P.P.1    Au, M.H.2    Kapadia, A.3    Smith, S.W.4
  • 35
    • 80052000611 scopus 로고    scopus 로고
    • Anonymous IP-address blocking in tor with trusted computing (Short paper: Work in progress)
    • Tokyo, Japan, November
    • P. P. Tsang, A. Kapadia, and S. W. Smith, "Anonymous IP-address Blocking in Tor with Trusted Computing (Short Paper: Work in Progress)," in Proceedings of WATC 2006 (Fall), Tokyo, Japan, November 2006.
    • (2006) Proceedings of WATC 2006 (Fall)
    • Tsang, P.P.1    Kapadia, A.2    Smith, S.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.