메뉴 건너뛰기




Volumn 4341 LNCS, Issue , 2006, Pages 81-98

Efficient dynamic k-times anonymous authentication

Author keywords

Anonymity; Dynamic k times anonymous authentication; E tag; K show anonymous credentials; Privacy

Indexed keywords

AUTHENTICATION; COPYRIGHTS; DATA PRIVACY; ELECTRONIC VOTING;

EID: 84887271407     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11958239_6     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Springer-Verlag, LNCS 3027
    • D. Boneh and X. Boyen. Short Signatures Without Random Oracles. EUROCRYPT 2004, Springer-Verlag, LNCS 3027, pp. 56-73.
    • EUROCRYPT 2004 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Springer-Verlag, LNCS 3027
    • D. Boneh and X. Boyen. Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004, Springer-Verlag, LNCS 3027, pp. 223-238.
    • EUROCRYPT 2004 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 3
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Springer-Verlag, LNCS 2442
    • J. Camenisch, and A. Lysyanskaya. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002, Springer-Verlag, LNCS 2442, pp. 61-76.
    • CRYPTO 2002 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 4
    • 0242500707 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Springer-Verlag, LNCS 2576
    • J. Camenisch and A. Lysyanskaya. A Signature Scheme with Efficient Protocols. SCN 2002, Springer-Verlag, LNCS 2576.
    • SCN 2002
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Springer-Verlag, LNCS 3386
    • Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs and Keys. Public Key Cryptography 2005, Springer-Verlag, LNCS 3386, pp. 416-431.
    • Public Key Cryptography 2005 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 8
    • 84990731886 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer-Verlag, LNCS 263
    • A. Fiat, and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. CRYPTO 1986, Springer-Verlag, LNCS 263, pp. 186-194.
    • CRYPTO 1986 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 10
    • 29244453439 scopus 로고    scopus 로고
    • Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders
    • A. Kiayias, and Moti Yung. Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders. Cryptology ePrint Archive: Report 2004/076.
    • Cryptology EPrint Archive: Report 2004/076
    • Kiayias, A.1    Yung, M.2
  • 13
    • 35048839792 scopus 로고    scopus 로고
    • K-times anonymous authentication
    • Springer-Verlag, LNCS 3329
    • I. Teranisi, J. Furukawa, and K. Sako. k-Times Anonymous Authentication. ASI-ACRYPT 2004, Springer-Verlag, LNCS 3329, pp. 308-322, 2004.
    • (2004) ASI-ACRYPT 2004 , pp. 308-322
    • Teranisi, I.1    Furukawa, J.2    Sako, K.3
  • 14
    • 33745871113 scopus 로고    scopus 로고
    • K-times anonymous authentication with a constant proving cost
    • Springer-Verlag, LNCS 3958
    • I. Teranishi and K. Sako. k-Times Anonymous Authentication with a Constant Proving Cost. Public Key Cryptography 2006, Springer-Verlag, LNCS 3958, pp. 525-542, 2006.
    • (2006) Public Key Cryptography 2006 , pp. 525-542
    • Teranishi, I.1    Sako, K.2
  • 15
    • 33646002029 scopus 로고    scopus 로고
    • Tracing-by-linking group signatures
    • Springer-Verlag, LNCS 3650
    • V. Wei. Tracing-by-Linking Group Signatures. Information Security Conference (ISC) 2005, Springer-Verlag, LNCS 3650, pp. 149-163, 2005.
    • (2005) Information Security Conference (ISC) 2005 , pp. 149-163
    • Wei, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.