메뉴 건너뛰기




Volumn , Issue , 2010, Pages 33-56

A cryptographic framework for the controlled release of certified data

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84892051774     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-73821-5_2     Document Type: Chapter
Times cited : (1)

References (49)
  • 1
    • 84892115406 scopus 로고    scopus 로고
    • Portia project, website. crypto.stanford.edu/portia.
  • 2
    • 84892000777 scopus 로고    scopus 로고
    • PRIME project, website. www.prime-project.eu.org.
  • 4
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • M. Bellare, editor, of Lecture Notes in Computer Science, Springer, Berlin 2000
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer, Berlin 2000.
    • Advances in Cryptology - CRYPTO 2000 , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 5
    • 84957360970 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • W. Fumy, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • N. Barić and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 480-494. Springer, Berlin 1997.
    • (1997) Advances in Cryptology - EUROCRYPT'97 , vol.1233 , pp. 480-494
    • Barić, N.1    Pfitzmann, B.2
  • 6
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • E. F. Brickell, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • M. Bellare and O. Goldreich. On defining proofs of knowledge. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO'92, volume 740 of Lecture Notes in Computer Science, pages 390-420. Springer, Berlin 1992.
    • (1992) Advances in Cryptology - CRYPTO'92 , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • J. Kilian, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer, Berlin 2001.
    • (2001) Advances in Cryptology - CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 84867248592 scopus 로고
    • Untraceable off-line cash in wallets with observers
    • D. R. Stinson, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • S. Brands. Untraceable off-line cash in wallets with observers. In D. R. Stinson, editor, Advances in Cryptology - CRYPTO'93, volume 773 of Lecture Notes in Computer Science, pages 302-318, Springer, Berlin 1993.
    • (1993) Advances in Cryptology - CRYPTO'93 , vol.773 , pp. 302-318
    • Brands, S.1
  • 13
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
    • T. Okamoto, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 331-345. Springer, Berlin 2000.
    • (2000) Advances in Cryptology - ASIACRYPT 2000 , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgård, I.2
  • 14
    • 23944501377 scopus 로고    scopus 로고
    • Group signatures: Better efficiency and new theoretical aspects
    • of LNCS, Springer, Berlin
    • J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In Proceedings of SCN'04, volume 3352 of LNCS, pages 120-133, Springer, Berlin 2004.
    • (2004) Proceedings of SCN'04 , vol.3352 , pp. 120-133
    • Camenisch, J.1    Groth, J.2
  • 15
    • 15744367730 scopus 로고    scopus 로고
    • Design and implementation of the idemix anonymous credential system
    • IBM Research Division, May
    • J. Camenisch and E. V. Herreweghen. Design and implementation of the idemix anonymous credential system. Technical Report Research Report RZ 3419, IBM Research Division, May 2002.
    • (2002) Technical Report Research Report RZ 3419
    • Camenisch, J.1    Herreweghen, E.V.2
  • 16
    • 33749684958 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • IBM Research Division, Nov
    • J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Technical Report Research Report RZ 3295, IBM Research Division, Nov. 2000.
    • (2000) Technical Report Research Report RZ 3295
    • Camenisch, J.1    Lysyanskaya, A.2
  • 17
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • B. Pfitzmann, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer, Berlin 2001.
    • (2001) Advances in Cryptology - EUROCRYPT 2001 , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 18
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • S. Cimato, C. Galdi, and G. Persiano, editors, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer, Berlin 2003.
    • (2003) Security in Communication Networks, Third International Conference, SCN 2002 , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 19
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • M. K. Franklin, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 56-72. Springer, Berlin 2004.
    • (2004) Advances in Cryptology - CRYPTO 2004 , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 20
    • 84947809553 scopus 로고    scopus 로고
    • A group signature scheme with improved efficiency
    • K. Ohta and D. Pei, editors, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and M. Michels. A group signature scheme with improved efficiency. In K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT'98, volume 1514 of Lecture Notes in Computer Science, pages 160-174. Springer, Berlin 1998.
    • (1998) Advances in Cryptology - ASIACRYPT'98 , vol.1514 , pp. 160-174
    • Camenisch, J.1    Michels, M.2
  • 21
    • 84921060028 scopus 로고    scopus 로고
    • Separability and efficiency for generic group signature schemes
    • M. Wiener, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In M. Wiener, editor, Advances in Cryptology - CRYPTO'99, volume 1666 of Lecture Notes in Computer Science, pages 413-430. Springer, Berlin 1999.
    • (1999) Advances in Cryptology - CRYPTO'99 , vol.1666 , pp. 413-430
    • Camenisch, J.1    Michels, M.2
  • 22
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • D. Boneh, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 126-144, Springer, Berlin 2003.
    • (2003) Advances in Cryptology - CRYPTO 2003 , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 23
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • B. Kaliski, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski, editor, Advances in Cryptology - CRYPTO'97, volume 1296 of Lecture Notes in Computer Science, pages 410-424. Springer, Berlin 1997.
    • (1997) Advances in Cryptology - CRYPTO'97 , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 25
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, Feb. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 26
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Plenum, New York
    • D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology - Proceedings of CRYPTO'82, pages 199-203. Plenum, New York, 1983.
    • (1983) Advances in Cryptology - Proceedings of CRYPTO'82 , pp. 199-203
    • Chaum, D.1
  • 27
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, Oct. 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 28
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • M. Odlyzko, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • D. Chaum and J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In M. Odlyzko, editor, Advances in Cryptology - CRYPTO'86, volume 263 of Lecture Notes in Computer Science, pages 118-167. Springer, Berlin 1987.
    • (1987) Advances in Cryptology - CRYPTO'86 , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 29
    • 84929273746 scopus 로고
    • Untraceable electronic cash
    • S. Goldwasser, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In S. Goldwasser, editor, Advances in Cryptology - CRYPTO'88, volume 403 of Lecture Notes in Computer Science, pages 319-327. Springer, Berlin 1990.
    • (1990) Advances in Cryptology - CRYPTO'88 , vol.403 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 30
    • 85024290278 scopus 로고
    • Group signatures
    • D. W. Davies, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT'91, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer, Berlin 1991.
    • (1991) Advances in Cryptology - EUROCRYPT'91 , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 31
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • H. Krawczyk, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO'98, volume 1642 of Lecture Notes in Computer Science, pages 13-25, Springer, Berlin 1998.
    • (1998) Advances in Cryptology - CRYPTO'98 , vol.1642 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 33
    • 23044533897 scopus 로고    scopus 로고
    • An integer commitment scheme based on groups with hidden order
    • of Lecture Notes in Computer Science, Springer, Berlin
    • I. Damgård and E. Fujisaki. An integer commitment scheme based on groups with hidden order. In Advances in Cryptology - ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science. Springer, Berlin 2002.
    • (2002) Advances in Cryptology - ASIACRYPT 2002 , vol.2501
    • Damgård, I.1    Fujisaki, E.2
  • 34
    • 84947214473 scopus 로고    scopus 로고
    • Generic lower bounds for root extraction and signature schemes in general groups
    • L. Knudsen, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • I. Damgård and M. Koprowski. Generic lower bounds for root extraction and signature schemes in general groups. In L. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 256-271. Springer, Berlin 2002.
    • (2002) Advances in Cryptology - EUROCRYPT 2002 , vol.2332 , pp. 256-271
    • Damgård, I.1    Koprowski, M.2
  • 35
    • 85031802442 scopus 로고
    • Payment systems and credential mechanism with provable security against abuse by individuals
    • S. Goldwasser, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • I. B. Damgård. Payment systems and credential mechanism with provable security against abuse by individuals. In S. Goldwasser, editor, Advances in Cryptology - CRYPTO'88, volume 403 of Lecture Notes in Computer Science, pages 328-335. Springer, Berlin 1990.
    • (1990) Advances in Cryptology - CRYPTO'88 , vol.403 , pp. 328-335
    • Damgård, I.B.1
  • 36
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. M. Odlyzko, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Advances in Cryptology - CRYPTO'86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer, Berlin 1987.
    • (1987) Advances in Cryptology - CRYPTO'86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 37
    • 33749681317 scopus 로고    scopus 로고
    • Witness hiding protocols to confirm modular polynomial relations
    • Fukuoka, Japan, Jan, The Institute of Electronics, Information and Communcation Engineers. SCSI97-33D
    • E. Fujisaki and T. Okamoto. Witness hiding protocols to confirm modular polynomial relations. In The 1997 Symposium on Cryptograpy and Information Security, Fukuoka, Japan, Jan. 1997. The Institute of Electronics, Information and Communcation Engineers. SCSI97-33D.
    • (1997) The 1997 Symposium on Cryptograpy and Information Security
    • Fujisaki, E.1    Okamoto, T.2
  • 38
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Y. Zheng, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 548-566. Springer, Berlin 2002.
    • (2002) Advances in Cryptology - ASIACRYPT 2002 , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 41
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Apr
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, Apr. 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 42
    • 84946844750 scopus 로고    scopus 로고
    • A one-round protocol for tripartite Diffie-Hellman
    • of Lecture Notes in Computer Science, Springer, Berlin
    • A. Joux. A one-round protocol for tripartite Diffie-Hellman. In Proceedings of the ANTS-IV conference, volume 1838 of Lecture Notes in Computer Science, pages 385-394. Springer, Berlin 2000.
    • (2000) Proceedings of the ANTS-IV Conference , vol.1838 , pp. 385-394
    • Joux, A.1
  • 44
    • 0038650644 scopus 로고    scopus 로고
    • Pseudonym systems
    • H. Heys and C. Adams, editors, of Lecture Notes in Computer Science, Springer, Berlin
    • A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In H. Heys and C. Adams, editors, Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science. Springer, Berlin 1999.
    • (1999) Selected Areas in Cryptography , vol.1758
    • Lysyanskaya, A.1    Rivest, R.2    Sahai, A.3    Wolf, S.4
  • 45
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite residuosity classes
    • J. Stern, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • P. Paillier. Public-key cryptosystems based on composite residuosity classes. In J. Stern, editor, Advances in Cryptology - EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 223-239. Springer, Berlin 1999.
    • (1999) Advances in Cryptology - EUROCRYPT'99 , vol.1592 , pp. 223-239
    • Paillier, P.1
  • 46
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum, editor, of, Lecture Notes in Computer Science, Springer, Berlin
    • T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer, Berlin 1992.
    • (1992) Advances in Cryptology - CRYPTO'91 , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 47
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • U. Maurer, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In U. Maurer, editor, Advances in Cryptology - EUROCRYPT'96, volume 1070 of Lecture Notes in Computer Science, pages 387-398. Springer, Berlin 1996.
    • (1996) Advances in Cryptology - EUROCRYPT'96 , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 49
    • 84946849368 scopus 로고    scopus 로고
    • Self-blindable credential certificates from the weil pairing
    • C. Boyd, editor, of Lecture Notes in Computer Science, Springer, Berlin
    • E. Verheul. Self-blindable credential certificates from the weil pairing. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 533-551. Springer, Berlin 2001.
    • (2001) Advances in Cryptology - ASIACRYPT 2001 , vol.2248 , pp. 533-551
    • Verheul, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.