메뉴 건너뛰기




Volumn 15, Issue 1, 2012, Pages

Efficient attributes for anonymous credentials

Author keywords

Algorithms; Performance; Security

Indexed keywords

ANONYMOUS CREDENTIAL; ANONYMOUS CREDENTIAL SYSTEMS; CELL PHONE; DISCRETE BINARY; ELECTRONIC IDENTITY; MODULAR EXPONENTIATIONS; PERFORMANCE; PERFORMANCE IMPACT; PRIME NUMBER; REALISTIC APPLICATIONS; SECURITY; SMALL DEVICES; STRONG RSA ASSUMPTION;

EID: 84859475923     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2133375.2133379     Document Type: Conference Paper
Times cited : (26)

References (48)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalitionresistant group signature scheme
    • M. Bellare Ed., Lecture Notes in Computer Science, Springer Verlag
    • ATENIESE, G., CAMENISCH, J., JOYE, M., AND TSUDIK, G. 2000. A practical and provably secure coalitionresistant group signature scheme. In Advances in Cryptology (CRYPTO). M. Bellare Ed., Lecture Notes in Computer Science, vol. 1880. Springer Verlag, 255-270.
    • (2000) Advances in Cryptology (CRYPTO) , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 2
    • 84957360970 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • Advances in Cryptology - Eurocrypt '97
    • BARIĆ, N. AND PFITZMANN, B. 1997. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology (EUROCRYPT). W. Fumy Ed., Lecture Notes in Computer Science, vol. 1233. Springer Verlag, 480-494. (Pubitemid 127067821)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 480-494
    • Baric, N.1    Pfitzmann, B.2
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • M. K. Franklin Ed., Lecture Notes in Computer Science, Springer Verlag
    • BONEH, D., BOYEN, X., AND SHACHAM, H. 2004. Short group signatures. In Advances in Cryptology (CRYPTO). M. K. Franklin Ed., Lecture Notes in Computer Science, vol. 3152. Springer Verlag, 41-55.
    • (2004) Advances in Cryptology (CRYPTO) , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 5
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • B. Preneel Ed., Lecture Notes in Computer Science, Springer Verlag
    • BOUDOT, F. 2000. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology (EUROCRYPT). B. Preneel Ed., Lecture Notes in Computer Science, vol. 1807. Springer Verlag, 431-444.
    • (2000) Advances in Cryptology (EUROCRYPT) , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 9
    • 84957366640 scopus 로고    scopus 로고
    • Rapid demonstration of linear relations connected by boolean operators
    • Advances in Cryptology - Eurocrypt '97
    • BRANDS, S. 1997. Rapid demonstration of linear relations connected by boolean operators. In Advances in Cryptology (EUROCRYPT). W. Fumy Ed., Lecture Notes in Computer Science, vol. 1233. Springer Verlag, 318-333. (Pubitemid 127067810)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 318-333
    • Brands, S.1
  • 12
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Advances in Cryptology - CRYPTO '97
    • CAMENISCH, J. AND STADLER, M. 1997. Efficient group signature schemes for large groups. In Advances in Cryptology (CRYPTO). B. Kaliski Ed., Lecture Notes in Computer Science, vol. 1296. Springer Verlag, 410-424. (Pubitemid 127112569)
    • (1997) Lecture Notes in Computer Science , Issue.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 13
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • J. Stern Ed., Lecture Notes in Computer Science, Springer Verlag
    • CAMENISCH, J. AND MICHELS, M. 1999. Proving in zero-knowledge that a number n is the product of two safe primes. In Advances in Cryptology (EUROCRYPT). J. Stern Ed., Lecture Notes in Computer Science, vol. 1592. Springer Verlag, 107-122.
    • (1999) Advances in Cryptology (EUROCRYPT) , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 14
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous multi-show credential system with optional anonymity revocation
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Advances in Cryptology (EUROCRYPT). B. Pfitzmann Ed., Lecture Notes in Computer Science, vol. 2045. Springer Verlag, 93-118. (Pubitemid 33275827)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 15
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • M. Yung Ed., Lecture Notes in Computer Science, Springer Verlag
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology (CRYPTO). M. Yung Ed., Lecture Notes in Computer Science, vol. 2442. Springer Verlag, 61-76.
    • (2002) Advances in Cryptology (CRYPTO) , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 17
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • M. K. Franklin Ed., Lecture Notes in Computer Science, Springer Verlag
    • CAMENISCH, J. AND LYSYANSKAYA, A. 2004. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology (CRYPTO). M. K. Franklin Ed., Lecture Notes in Computer Science, vol. 3152. Springer Verlag, 56-72.
    • (2004) Advances in Cryptology (CRYPTO) , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 18
    • 84911415363 scopus 로고    scopus 로고
    • Efficient attributes for anonymous credentials (extended version)
    • IACR
    • CAMENISCH, J. AND GROSS, T. 2011. Efficient attributes for anonymous credentials (extended version). Cryptology ePrint Archive Report 2010/496, IACR. http://eprint.iacr.org/.
    • (2011) Cryptology EPrint Archive Report 2010/496
    • Camenisch, J.1    Gross, T.2
  • 19
    • 24944435537 scopus 로고    scopus 로고
    • Compact e-cash
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • CAMENISCH, J., HOHENBERGER, S., AND LYSYANSKAYA, A. 2005. Compact E-cash. In Advances in Cryptology (Eurocrypt). R. Cramer Ed., Lecture Notes in Computer Science, vol. 3494. Springer, 302-321. (Pubitemid 41313960)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 20
    • 34547379480 scopus 로고    scopus 로고
    • How to win the clonewars: Efficient periodic n-times anonymous authentication
    • DOI 10.1145/1180405.1180431, 1180431, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • CAMENISCH, J.,HOHENBERGER, S.,KOHLWEISS, M., LYSYANSKAYA, A., AND MEYEROVICH, M. 2006. How to win the clonewars: efficient periodic n-times anonymous authentication. In Proceedings of the ACM Conference on Computer and Communications Security. A. Juels, R. N. Wright, and S. D. C. di Vimercati Eds., ACM, 201-210. (Pubitemid 47131369)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 201-210
    • Camenisch, J.1    Hohenberger, S.2    Kohlweiss, M.3    Lysyanskaya, A.4    Meyerovich, M.5
  • 23
    • 84957661460 scopus 로고    scopus 로고
    • Easy come-easy go divisible cash
    • K. Nyberg Ed., Lecture Notes in Computer Science, Springer Verlag
    • CHAN, A., FRANKEL, Y., AND TSIOUNIS, Y. 1998. Easy come-easy go divisible cash. In Advances in Cryptology (EUROCRYPT). K. Nyberg Ed., Lecture Notes in Computer Science, vol. 1403. Springer Verlag, 561-575.
    • (1998) Advances in Cryptology (EUROCRYPT) , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 24
    • 0019532104 scopus 로고
    • Untraceable electronicmail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • CHAUM, D. 1981. Untraceable electronicmail, return addresses, and digital pseudonyms. Comm. ACM 24, 2, 84-88. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 25
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, R. L. Rivest, and A. T. Sherman Eds., Plenum Press
    • CHAUM, D. 1983. Blind signatures for untraceable payments. In Advances in Cryptology (CRYPTO). D. Chaum, R. L. Rivest, and A. T. Sherman Eds., Plenum Press, 199-203.
    • (1983) Advances in Cryptology (CRYPTO). , pp. 199-203
    • Chaum, D.1
  • 26
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • DOI 10.1145/4372.4373
    • CHAUM, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Comm. ACM 28, 10, 1030-1044. (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 27
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • M. Odlyzko Ed., Lecture Notes in Computer Science, Springer Verlag
    • CHAUM, D. AND EVERTSE, J.-H. 1987. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology (CRYPTO). M. Odlyzko Ed., Lecture Notes in Computer Science, vol. 263. Springer Verlag, 118-167.
    • (1987) Advances in Cryptology (CRYPTO) , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 28
    • 85024290278 scopus 로고
    • Group signatures
    • D. W. Davies Ed., Lecture Notes in Computer Science, Springer Verlag
    • CHAUM, D. AND VAN HEYST, E. 1991. Group signatures. In Advances in Cryptology (EUROCRYPT). D. W. Davies Ed., Lecture Notes in Computer Science, vol. 547. Springer Verlag, 257-265.
    • (1991) Advances in Cryptology (EUROCRYPT) , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 29
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • E. F. Brickell Ed., Lecture Notes in Computer Science, Springer Verlag
    • CHAUM, D. AND PEDERSEN, T. P. 1993. Wallet databases with observers. In Advances in Cryptology (CRYPTO). E. F. Brickell Ed., Lecture Notes in Computer Science, vol. 740. Springer Verlag, 89-105.
    • (1993) Advances in Cryptology (CRYPTO) , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 30
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Y. G. Desmedt Ed., Lecture Notes in Computer Science, Springer Verlag
    • CRAMER, R., DAMGÅRD, I., AND SCHOENMAKERS, B. 1994. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology (CRYPTO). Y. G. Desmedt Ed., Lecture Notes in Computer Science, vol. 839. Springer Verlag, 174-187.
    • (1994) Advances in Cryptology (CRYPTO) , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 32
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A.M. Odlyzko Ed., Lecture Notes in Computer Science, Springer Verlag
    • FIAT, A. AND SHAMIR, A. 1987. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology (CRYPTO). A.M. Odlyzko Ed., Lecture Notes in Computer Science, vol. 263. Springer Verlag, 186-194.
    • (1987) Advances in Cryptology (CRYPTO) , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 33
    • 84947809856 scopus 로고    scopus 로고
    • Fair off-line e-cash made easy
    • Advances in Cryptology - ASIACRYPT '98
    • FRANKEL, Y., TSIOUNIS, Y., AND YUNG, M. 1998. Fair off-line e-cash made easy. In Advances in Cryptology (ASIACRYPT). K. Kim and T. Matsumoto Eds., Lecture Notes in Computer Science, vol. 1514. Springer Verlag, 257-270. (Pubitemid 128151425)
    • (1998) Lecture Notes in Computer Science , Issue.1514 , pp. 257-270
    • Frankel, Y.1    Tsiounis, Y.2    Yung, M.3
  • 34
    • 0001292443 scopus 로고
    • A practical secret voting scheme for large scale elections
    • J. Seberry and Y. Zheng Eds., Lecture Notes in Computer Science, Springer
    • FUJIOKA, A., OKAMOTO, T., AND OHTA, K. 1992. A practical secret voting scheme for large scale elections. In Advances in Cryptology (ASIACRYPT). J. Seberry and Y. Zheng Eds., Lecture Notes in Computer Science, vol. 718. Springer, 244-251.
    • (1992) Advances in Cryptology (ASIACRYPT) , vol.718 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 35
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • Advances in Cryptology - CRYPTO '97
    • FUJISAKI, E. AND OKAMOTO, T. 1997. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology (CRYPTO). B. Kaliski Ed., Lecture Notes in Computer Science, vol. 1294. Springer Verlag, 16-30. (Pubitemid 127112542)
    • (1997) Lecture Notes in Computer Science , Issue.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 36
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • GOLDWASSER, S., MICALI, S., AND RIVEST, R. 1988. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2, 281-308.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 38
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • KIAYIAS, A. AND YUNG, M. 2006. Secure scalable group signature with dynamic joins and separable authorities. Int. J. Secur. Netw. 1, 1/2, 24-45.
    • (2006) Int. J. Secur. Netw. , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 39
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • C. Cachin and J. Camenisch Eds., Lecture Notes in Computer Science, Springer
    • KIAYIAS, A., YUNG, M., AND TSIOUNIS, Y. 2004. Traceable signatures. In Advances in Cryptology (EUROCRYPT). C. Cachin and J. Camenisch Eds., Lecture Notes in Computer Science, vol. 3027. Springer, 571-589.
    • (2004) Advances in Cryptology (EUROCRYPT) , vol.3027 , pp. 571-589
    • Kiayias, A.1    Yung, M.2    Tsiounis, Y.3
  • 40
    • 0017217375 scopus 로고
    • Riemann's hypothesis and tests for primality
    • MILLER, G. L. 1976. Riemann's hypothesis and tests for primality. J. Comput. Syst. Sci. 13, 300-317.
    • (1976) J. Comput. Syst. Sci. , vol.13 , pp. 300-317
    • Miller, G.L.1
  • 42
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum Ed., Lecture Notes in Computer Science, Springer Verlag
    • PEDERSEN, T. P. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology (CRYPTO). J. Feigenbaum Ed., Lecture Notes in Computer Science, vol. 576, Springer Verlag, 129-140.
    • (1992) Advances in Cryptology (CRYPTO) , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 43
    • 33845432604 scopus 로고
    • Probabilistic algorithm for testing primality
    • RABIN, M. O. 1980. Probabilistic algorithm for testing primality. J. Number Theory 12, 128-138.
    • (1980) J. Number Theory , vol.12 , pp. 128-138
    • Rabin, M.O.1
  • 44
    • 84990587369 scopus 로고
    • Randomized algorithms in number theory
    • RABIN, M. O. AND SHALLIT, J. O. 1986. Randomized algorithms in number theory. Comm. Pure Appl. Math. 39, 239-256.
    • (1986) Comm. Pure Appl. Math. , vol.39 , pp. 239-256
    • Rabin, M.O.1    Shallit, J.O.2
  • 45
    • 0000089246 scopus 로고
    • Efficient signature generation for smart cards
    • SCHNORR, C. P. 1991. Efficient signature generation for smart cards. J. Cryptology 4, 3, 239-252.
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 47
    • 70349268816 scopus 로고    scopus 로고
    • SPF INT ÉRIEUR. SPF Intérieur, Service Registres de la Population et Cartes d'identité, Bruxelles.
    • SPF INT ÉRIEUR. 2005. Instructions generales relatives à la carte d'indentité électronique. SPF Intérieur, Service Registres de la Population et Cartes d'identité, Bruxelles. http://www.registrenational.fgov.be.
    • (2005) Instructions Generales Relatives À la Carte d'Indentité Électronique


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.