메뉴 건너뛰기




Volumn , Issue , 2012, Pages 929-940

PERM: Practical reputation-based blacklisting without TTPs

Author keywords

Accountable anonymity; Anonymous blacklisting; Revocation

Indexed keywords

ACCOUNTABLE ANONYMITY; ANONYMOUS BLACKLISTING; ANONYMOUS CREDENTIAL; COMPUTATIONAL OVERHEADS; LARGE-SCALE DEPLOYMENT; REVOCATION; SERVICE PROVIDER; TRUSTED THIRD PARTIES; USER SESSIONS; WIKIPEDIA; YOUTUBE;

EID: 84869474722     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382294     Document Type: Conference Paper
Times cited : (30)

References (27)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • volume 1880 of Lecture Notes in Computer Science, Springer
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer, 2000.
    • (2000) CRYPTO , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 3
    • 33749993205 scopus 로고    scopus 로고
    • Constant-size dynamic k-TAA
    • volume 4116 of Lecture Notes in Computer Science, Springer
    • M. H. Au, W. Susilo, and Y. Mu. Constant-Size Dynamic k-TAA. In SCN, volume 4116 of Lecture Notes in Computer Science, pages 111-125. Springer, 2006.
    • (2006) SCN , pp. 111-125
    • Au, M.H.1    Susilo, W.2    Mu, Y.3
  • 4
    • 84865584730 scopus 로고    scopus 로고
    • PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
    • Dec.
    • M. H. Au, P. P. Tsang, and A. Kapadia. PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users. ACM Transactions on Information and System Security, 14:29:1-29:34, Dec. 2011.
    • (2011) ACM Transactions on Information and System Security , vol.14 , pp. 291-2934
    • Au, M.H.1    Tsang, P.P.2    Kapadia, A.3
  • 7
    • 85012908743 scopus 로고
    • One-way accumulators: A decentralized alternative to digital sinatures (extended abstract)
    • J. C. Benaloh and M. de Mare. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract). In EUROCRYPT, pages 274-285, 1993.
    • (1993) EUROCRYPT , pp. 274-285
    • Benaloh, J.C.1    De Mare, M.2
  • 8
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • volume 3152 of Lecture Notes in Computer Science
    • D. Boneh, X. Boyen, and H. Shacham. Short Group Signatures. In CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 41-55, 2004.
    • (2004) CRYPTO , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 9
    • 58349085879 scopus 로고    scopus 로고
    • Efficient protocols for set membership and range proofs
    • volume 5350 of Lecture Notes in Computer Science, Springer
    • J. Camenisch, R. Chaabouni, and A. Shelat. Efficient Protocols for Set Membership and Range Proofs. In ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, pages 234-252. Springer, 2008.
    • (2008) ASIACRYPT , pp. 234-252
    • Camenisch, J.1    Chaabouni, R.2    Shelat, A.3
  • 10
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • volume 2576 of Lecture Notes in Computer Science, Springer
    • J. Camenisch and A. Lysyanskaya. A Signature Scheme with Efficient Protocols. In SCN, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer, 2002.
    • (2002) SCN , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • volume 3152 of Lecture Notes in Computer Science
    • J. Camenisch and A. Lysyanskaya. Signature Schemes and Anonymous Credentials from Bilinear Maps. In CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 56-72, 2004.
    • (2004) CRYPTO , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups (extended abstract)
    • B. S. K. Jr., editor, volume 1294 of Lecture Notes in Computer Science, Springer
    • J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In B. S. K. Jr., editor, CRYPTO, volume 1294 of Lecture Notes in Computer Science, pages 410-424. Springer, 1997.
    • (1997) CRYPTO , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 13
    • 85024290278 scopus 로고
    • Group signatures
    • D. Chaum and E. van Heyst. Group Signatures. In EUROCRYPT, pages 257-265, 1991.
    • (1991) EUROCRYPT , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 14
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Y. Desmedt, editor, volume 839 of Lecture Notes in Computer Science
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Y. Desmedt, editor, CRYPTO, volume 839 of Lecture Notes in Computer Science, pages 174-187, 1994.
    • (1994) CRYPTO , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 16
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18(1):186-208, 1989.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 17
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput., 17(2):281-308, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 18
    • 77955455561 scopus 로고    scopus 로고
    • Making a nymbler nymble using VERBS
    • volume 6205 of Lecture Notes in Computer Science
    • R. Henry, K. Henry, and I. Goldberg. Making a Nymbler Nymble Using VERBS. In Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, pages 111-129, 2010.
    • (2010) Privacy Enhancing Technologies , pp. 111-129
    • Henry, R.1    Henry, K.2    Goldberg, I.3
  • 19
    • 38149012971 scopus 로고    scopus 로고
    • Nymble: Anonymous IP-address blocking
    • volume 4776 of Lecture Notes in Computer Science, Springer
    • P. C. Johnson, A. Kapadia, P. P. Tsang, and S. W. Smith. Nymble: Anonymous IP-Address Blocking. In Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, pages 113-133. Springer, 2007.
    • (2007) Privacy Enhancing Technologies , pp. 113-133
    • Johnson, P.C.1    Kapadia, A.2    Tsang, P.P.3    Smith, S.W.4
  • 20
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • C. Cachin and J. Camenisch, editors, volume 3027 of Lecture Notes in Computer Science,rftxt Springer
    • A. Kiayias, Y. Tsiounis, and M. Yung. Traceable Signatures. In C. Cachin and J. Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 571-589. Springer, 2004.
    • (2004) EUROCRYPT , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 21
    • 78650209785 scopus 로고    scopus 로고
    • Jack: Scalable accumulator-based Nymble system
    • Z. Lin and N. Hopper. Jack: Scalable accumulator-based Nymble system. In WPES, pages 53-62, 2010.
    • (2010) WPES , pp. 53-62
    • Lin, Z.1    Hopper, N.2
  • 23
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • volume 576 of LNCS
    • T. P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In CRYPTO'91, volume 576 of LNCS, pages 129-140, 1992.
    • (1992) CRYPTO'91 , pp. 129-140
    • Pedersen, T.P.1
  • 26
    • 78651408573 scopus 로고    scopus 로고
    • BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs
    • P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Trans. Inf. Syst. Secur., 13(4):39, 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.4 , pp. 39
    • Tsang, P.P.1    Au, M.H.2    Kapadia, A.3    Smith, S.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.