메뉴 건너뛰기




Volumn , Issue , 2013, Pages 71-81

Thinking inside the BLAC box: Smarter protocols for faster anonymous blacklisting

Author keywords

anonymous blacklisting; batch zero knowledge proofs; efficiency

Indexed keywords

ACCESS STRUCTURE; ANONYMOUS BLACKLISTING; ANONYMOUS CREDENTIAL; PARTIAL KNOWLEDGE; TRUSTED THIRD PARTIES; VERIFICATION TECHNIQUES; ZERO KNOWLEDGE PROOF; ZERO-KNOWLEDGE PROTOCOLS;

EID: 84888993079     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517840.2517855     Document Type: Conference Paper
Times cited : (8)

References (34)
  • 1
    • 84869474722 scopus 로고    scopus 로고
    • PERM: Practical reputation-based blacklisting without TTPs
    • Raleigh, NC, USA, October
    • M. H. Au and A. Kapadia. PERM: Practical reputation-based blacklisting without TTPs. In Proceedings of CCS 2012, pages 929-940, Raleigh, NC, USA, October 2012.
    • (2012) Proceedings of CCS 2012 , pp. 929-940
    • Au, M.H.1    Kapadia, A.2
  • 3
    • 33749993205 scopus 로고    scopus 로고
    • Constant-size dynamic k-TAA
    • Proceedings of SCN 2006, Maiori, Italy, September
    • M. H. Au, W. Susilo, and Y. Mu. Constant-size dynamic k-TAA. In Proceedings of SCN 2006, volume 4116 of LNCS, pages 111-125, Maiori, Italy, September 2006.
    • (2006) LNCS , vol.4116 , pp. 111-125
    • Au, M.H.1    Susilo, W.2    Mu, Y.3
  • 4
    • 84865584730 scopus 로고    scopus 로고
    • PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
    • December
    • M. H. Au, P. P. Tsang, and A. Kapadia. PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Transactions on Information and System Security, 14(4):29, December 2011.
    • (2011) ACM Transactions on Information and System Security , vol.14 , Issue.4 , pp. 29
    • Au, M.H.1    Tsang, P.P.2    Kapadia, A.3
  • 5
    • 50849114523 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • Proceedings of EUROCRYPT 1998, Espoo, Finland, June
    • M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In Proceedings of EUROCRYPT 1998, volume 1403 of LNCS, pages 236-250, Espoo, Finland, June 1998.
    • (1998) LNCS , vol.1403 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 6
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption in bilinear groups
    • April
    • D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 21(2):149-177, April 2008.
    • (2008) Journal of Cryptology , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 7
    • 0000742754 scopus 로고
    • Addition chain heuristics
    • Proceedings of CRYPTO 1989, Santa Barbara, CA, USA, August
    • J. N. Bos and M. J. Coster. Addition chain heuristics. In Proceedings of CRYPTO 1989, volume 435 of LNCS, pages 400-407, Santa Barbara, CA, USA, August 1989.
    • (1989) LNCS , vol.435 , pp. 400-407
    • Bos, J.N.1    Coster, M.J.2
  • 8
    • 84863345554 scopus 로고    scopus 로고
    • Enhanced Privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
    • May
    • E. Brickell and J. Li. Enhanced Privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities. IEEE Transactions on Dependable and Secure Computing (TDSC), 9(3):345-360, May 2012.
    • (2012) IEEE Transactions on Dependable and Secure Computing (TDSC) , vol.9 , Issue.3 , pp. 345-360
    • Brickell, E.1    Li, J.2
  • 9
    • 85027967075 scopus 로고
    • Fast exponentiation with precomputation
    • extended abstract. Proceedings of EUROCRYPT 1992, Balatonfüred, Hungary, May
    • E. F. Brickell, D. M. Gordon, K. S. McCurley, and D. B. Wilson. Fast exponentiation with precomputation (extended abstract). In Proceedings of EUROCRYPT 1992, volume 658 of LNCS, pages 200-207, Balatonfüred, Hungary, May 1992.
    • (1992) LNCS , vol.658 , pp. 200-207
    • Brickell, E.F.1    Gordon, D.M.2    McCurley, K.S.3    Wilson, D.B.4
  • 10
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Proceedings of CRYPTO 2003, Santa Barbara, CA, USA, August
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Proceedings of CRYPTO 2003, volume 2729 of LNCS, pages 126-144, Santa Barbara, CA, USA, August 2003.
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 11
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • extended abstract. Proceedings of CRYPTO 1997, Santa Barbara, CA, USA, August
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups (extended abstract). In Proceedings of CRYPTO 1997, volume 1294 of LNCS, pages 410-424, Santa Barbara, CA, USA, August 1997.
    • (1997) LNCS , vol.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 12
    • 84862489679 scopus 로고
    • Wallet databases with observers
    • Proceedings of CRYPTO 1992, Santa Barbara, CA, USA, August
    • D. Chaum and T. P. Pedersen. Wallet databases with observers. In Proceedings of CRYPTO 1992, volume 740 of LNCS, pages 89-105, Santa Barbara, CA, USA, August 1992.
    • (1992) LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 13
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Proceedings of CRYPTO 1994, Santa Barbara, CA, USA, August
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proceedings of CRYPTO 1994, volume 839 of LNCS, pages 174-187, Santa Barbara, CA, USA, August 1994.
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 14
    • 84864794192 scopus 로고    scopus 로고
    • Technical report, Aarhus Universitet, March 2011. CPT Available from
    • I. Damgård. On Σ-protocols. Technical report, Aarhus Universitet, March 2011. CPT 2011; Available from http://www.daimi.au.dk/~ivan/ Sigma.pdf.
    • (2011) On Σ-Protocols
    • Damgård, I.1
  • 15
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • Proceedings of IPTPS 2002, Cambridge, MA, USA, March
    • J. R. Douceur. The Sybil attack. In Proceedings of IPTPS 2002, volume 2429 of LNCS, pages 251-260, Cambridge, MA, USA, March 2002.
    • (2002) LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 16
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Proceedings of CRYPTO 1986, Santa Barbara, CA, USA, August
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of CRYPTO 1986, volume 263 of LNCS, pages 186-194, Santa Barbara, CA, USA, August 1986.
    • (1986) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 17
    • 80051954287 scopus 로고    scopus 로고
    • Formalizing anonymous blacklisting systems
    • Berkeley, CA, USA, May
    • R. Henry and I. Goldberg. Formalizing anonymous blacklisting systems. In Proceedings of IEEE S&P 2011, pages 81-95, Berkeley, CA, USA, May 2011.
    • (2011) Proceedings of IEEE S&P 2011 , pp. 81-95
    • Henry, R.1    Goldberg, I.2
  • 18
    • 84879868407 scopus 로고    scopus 로고
    • Technical Report CACR 2012-26, University of Waterloo, Waterloo, ON, Canada, December Available from
    • R. Henry and I. Goldberg. All-but-k mercurial commitments and their applications. Technical Report CACR 2012-26, University of Waterloo, Waterloo, ON, Canada, December 2012. Available from http://cacr.uwaterloo.ca/techreports/ 2012/cacr2012-26.pdf.
    • (2012) All-but-k Mercurial Commitments and Their Applications
    • Henry, R.1    Goldberg, I.2
  • 19
    • 84879855087 scopus 로고    scopus 로고
    • Batch proofs of partial knowledge
    • Proceedings of ACNS 2012, Banff, AB, Canada, June
    • R. Henry and I. Goldberg. Batch proofs of partial knowledge. In Proceedings of ACNS 2012, volume 7954 of LNCS, pages 502-517, Banff, AB, Canada, June 2013.
    • (2013) LNCS , vol.7954 , pp. 502-517
    • Henry, R.1    Goldberg, I.2
  • 20
    • 84889048529 scopus 로고    scopus 로고
    • extended version. Technical Report CACR 2013-26, University of Waterloo, Waterloo, ON, Canada, August Available from
    • R. Henry and I. Goldberg. Thinking inside the BLAC box: Smarter protocols for faster anonymous blacklisting (extended version). Technical Report CACR 2013-26, University of Waterloo, Waterloo, ON, Canada, August 2013. Available from http://cacr.uwaterloo.ca/techreports/2013/cacr2013-26.pdf.
    • (2013) Thinking Inside the BLAC Box: Smarter Protocols for Faster Anonymous Blacklisting
    • Henry, R.1    Goldberg, I.2
  • 21
    • 77955455561 scopus 로고    scopus 로고
    • Making a Nymbler Nymble using VERBS
    • Proceedings of PETS 2010, Berlin, Germany, July
    • R. Henry, K. Henry, and I. Goldberg. Making a Nymbler Nymble using VERBS. In Proceedings of PETS 2010, volume 6205 of LNCS, pages 111-129, Berlin, Germany, July 2010.
    • (2010) LNCS , vol.6205 , pp. 111-129
    • Henry, R.1    Henry, K.2    Goldberg, I.3
  • 22
    • 70350337337 scopus 로고    scopus 로고
    • How to hash into elliptic curves
    • Proceedings of CRYPTO 2009, Santa Barbara, CA, USA, August
    • T. Icart. How to hash into elliptic curves. In Proceedings of CRYPTO 2009, volume 5677 of LNCS, pages 303-316, Santa Barbara, CA, USA, August 2009.
    • (2009) LNCS , vol.5677 , pp. 303-316
    • Icart, T.1
  • 23
    • 38149012971 scopus 로고    scopus 로고
    • Nymble: Anonymous IP-address blocking
    • Proceedings of PETS 2007, Ottawa, ON, Canada, June
    • P. C. Johnson, A. Kapadia, P. P. Tsang, and S. W. Smith. Nymble: Anonymous IP-address blocking. In Proceedings of PETS 2007, volume 4776 of LNCS, pages 113-133, Ottawa, ON, Canada, June 2007.
    • (2007) LNCS , vol.4776 , pp. 113-133
    • Johnson, P.C.1    Kapadia, A.2    Tsang, P.P.3    Smith, S.W.4
  • 25
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • Proceedings of CRYPTO 1994, Santa Barbara, CA, USA, August
    • C. H. Lim and P. J. Lee. More flexible exponentiation with precomputation. In Proceedings of CRYPTO 1994, volume 839 of LNCS, pages 95-107, Santa Barbara, CA, USA, August 1994.
    • (1994) LNCS , vol.839 , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 26
    • 78650209785 scopus 로고    scopus 로고
    • Jack: Scalable accumulator-based nymble system
    • Chicago, IL, USA, October
    • Z. Lin and N. Hopper. Jack: Scalable accumulator-based nymble system. In Proceedings of WPES 2010, pages 53-62, Chicago, IL, USA, October 2010.
    • (2010) Proceedings of WPES 2010 , pp. 53-62
    • Lin, Z.1    Hopper, N.2
  • 27
    • 84857081450 scopus 로고    scopus 로고
    • BNymble: More anonymous blacklisting at almost no cost
    • a short paper. Proceedings of FC 2011, Gros Islet, St. Lucia, February
    • P. Lofgren and N. Hopper. BNymble: More anonymous blacklisting at almost no cost (a short paper). In Proceedings of FC 2011, volume 7035 of LNCS, pages 268-275, Gros Islet, St. Lucia, February 2011.
    • (2011) LNCS , vol.7035 , pp. 268-275
    • Lofgren, P.1    Hopper, N.2
  • 29
    • 85048607942 scopus 로고
    • Resource requirements for the application of addition chains in modulo exponentiation
    • Proceedings of EUROCRYPT 1992, Balatonfüred, Hungary, May
    • J. Sauerbrey and A. Dietel. Resource requirements for the application of addition chains in modulo exponentiation. In Proceedings of EUROCRYPT 1992, volume 658 of LNCS, pages 174-182, Balatonfüred, Hungary, May 1992.
    • (1992) LNCS , vol.658 , pp. 174-182
    • Sauerbrey, J.1    Dietel, A.2
  • 30
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Proceedings of CRYPTO 1989, Santa Barbara, CA, USA, August
    • C.-P. Schnorr. Efficient identification and signatures for smart cards. In Proceedings of CRYPTO 1989, volume 435 of LNCS, pages 239-252, Santa Barbara, CA, USA, August 1989.
    • (1989) LNCS , vol.435 , pp. 239-252
    • Schnorr, C.-P.1
  • 33
    • 77952377083 scopus 로고    scopus 로고
    • Blacklistable Anonymous Credentials: Blocking misbehaving users without TTPs
    • Alexandria, VA, USA, October
    • P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. Blacklistable Anonymous Credentials: Blocking misbehaving users without TTPs. In Proceedings of CCS 2007, pages 72-81, Alexandria, VA, USA, October 2007.
    • (2007) Proceedings of CCS 2007 , pp. 72-81
    • Tsang, P.P.1    Au, M.H.2    Kapadia, A.3    Smith, S.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.