메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1205-1216

Algebraic MACs and keyed-verification anonymous credentials

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA;

EID: 84910625963     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660328     Document Type: Conference Paper
Times cited : (76)

References (33)
  • 1
    • 33749993205 scopus 로고    scopus 로고
    • Constant-size dynamic k-TAA
    • Proceedings of SCN 2006
    • M. Au, W. Susilo, and Y. Mu. Constant-size dynamic k-TAA. Proceedings of SCN 2006, LNCS 4116 (2006), 111-125.
    • (2006) LNCS , vol.4116 , pp. 111-125
    • Au, M.1    Susilo, W.2    Mu, Y.3
  • 4
    • 69949124606 scopus 로고    scopus 로고
    • Randomizable proofs and delegatable anonymous credentials
    • Proceedings of CRYPTO 2009
    • M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya and H. Shacham. Randomizable proofs and delegatable anonymous credentials. Proceedings of CRYPTO 2009, LNCS 5677, (2009), 108-125.
    • (2009) LNCS , vol.5677 , pp. 108-125
    • Belenkiy, M.1    Camenisch, J.2    Chase, M.3    Kohlweiss, M.4    Lysyanskaya, A.5    Shacham, H.6
  • 5
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • Proceedings of CRYPTO 1992
    • M. Bellare and O. Goldreich. On Defining Proofs of Knowledge. Proceedings of CRYPTO 1992, LNCS 740 (1993), 390-420
    • (1993) LNCS , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 7
    • 84947778144 scopus 로고    scopus 로고
    • The decision diffie-hellman problem
    • Proceedings of ANTS-III
    • D. Boneh. The Decision Diffie-Hellman Problem. Proceedings of ANTS-III, LNCS 1423 (1998), 48-63.
    • (1998) LNCS , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 9
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Proceedings of EUROCRYPT 2001
    • J. Camenisch and A. Lysyanskaya. An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. Proceedings of EUROCRYPT 2001, LNCS 2045 (2001), 93-118.
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Proceedings of SCN 2003
    • J. Camenisch and A. Lysyanskaya. A Signature Scheme with Efficient Protocols. Proceedings of SCN 2003, LNCS 2576 (2003), 268-289.
    • (2003) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Proceedings of CRYPTO 2004
    • J. Camenisch and A. Lysyanskaya. Signature Schemes and Anonymous Credentials from Bilinear Maps. Proceedings of CRYPTO 2004, LNCS 3152 (2004), 56-72.
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 44449176564 scopus 로고    scopus 로고
    • The twin diffie-hellman problem and applications proceedings of eurocrypt 2008
    • D. Cash, E. Kiltz, and V. Shoup. The Twin Diffie-Hellman Problem and Applications Proceedings of Eurocrypt 2008, LNCS 4965 (2008), 127-145.
    • (2008) LNCS , vol.4965 , pp. 127-145
    • Cash, D.1    Kiltz, E.2    Shoup, V.3
  • 14
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28(10) (1985), 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 15
    • 84884477863 scopus 로고    scopus 로고
    • Shorter IBE and signatures via asymmetric pairings
    • Proceedings of Pairing 2012
    • J. Chen, H. Lim, S. Ling, H. Wang, and H. Wee. Shorter IBE and Signatures via Asymmetric Pairings. Proceedings of Pairing 2012, LNCS 7708,(2012), 122-140.
    • (2012) LNCS , vol.7708 , pp. 122-140
    • Chen, J.1    Lim, H.2    Ling, S.3    Wang, H.4    Wee, H.5
  • 16
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • Proceedings of EUROCRYPT'97
    • R. Cramer, R. Gennaro, and B. Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. Proceedings of EUROCRYPT'97, LNCS 1233, (1997), 103-118.
    • (1997) LNCS , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 17
    • 84948970500 scopus 로고    scopus 로고
    • Efficient concurrent zero-knowledge in the auxiliary string model
    • Proceedings of EUROCRYPT 2000
    • I. Damgárd. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. Proceedings of EUROCRYPT 2000, LNCS 1807 (2000), 418-430.
    • (2000) LNCS , vol.1807 , pp. 418-430
    • Damgárd, I.1
  • 18
    • 84859941399 scopus 로고    scopus 로고
    • Message authentication
    • Revisited. Proceedings of EUROCRYPT'12
    • Y. Dodis, E. Kiltz, K. Pietrzak, D. Wichs. Message Authentication, Revisited. Proceedings of EUROCRYPT'12, LNCS 7237 (2012), 355-374.
    • (2012) LNCS , vol.7237 , pp. 355-374
    • Dodis, Y.1    Kiltz, E.2    Pietrzak, K.3    Wichs, D.4
  • 19
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Proceedings of CRYPTO 1986
    • A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Proceedings of CRYPTO 1986, LNCS 263 (1987), 186-âA Ş194.
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 20
    • 33745123687 scopus 로고    scopus 로고
    • Communication-efficient non-interactive proofs of knowledge with online extractors
    • Proceedings of CRYPTO 2005
    • M. Fischlin. Communication-Efficient Non-Interactive Proofs of Knowledge with Online Extractors. Proceedings of CRYPTO 2005, LNCS 3621 (2005), 152-168.
    • (2005) LNCS , vol.3621 , pp. 152-168
    • Fischlin, M.1
  • 21
    • 84871534670 scopus 로고    scopus 로고
    • Dual form signatures: An approach for proving security from static assumptions
    • Proceedings of ASIACRYPT 2012
    • M. Gerbush, A. Lewko, A. O'Neill, and B. Waters Dual Form Signatures: An Approach for Proving Security from Static Assumptions. Proceedings of ASIACRYPT 2012, LNCS 7658 (2012), 25-42.
    • (2012) LNCS , vol.7658 , pp. 25-42
    • Gerbush, M.1    Lewko, A.2    O'Neill, A.3    Waters, B.4
  • 23
    • 84869463849 scopus 로고    scopus 로고
    • Specification of the identity mixer cryptographic library (revised version 2.3.0)
    • April
    • IBM. Specification of the Identity Mixer Cryptographic Library (Revised version 2.3.0). IBM Research Report RZ 3730, April 2010.
    • (2010) IBM Research Report RZ 3730
    • IBM1
  • 24
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • Proceedings of EUROCRYPT 1996
    • M. Jakobsson, K.Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. Proceedings of EUROCRYPT 1996, LNCS 1070 (1996) 143-154.
    • (1996) LNCS , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 27
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology 4 (1991), 161-174.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.1
  • 28
    • 84957026429 scopus 로고    scopus 로고
    • Security of blind discrete log signatures against interactive attacks
    • ICICS 2001
    • C. Schnorr. Security of Blind Discrete Log Signatures Against Interactive Attacks. ICICS 2001, LNCS 2229 (2001), 1-12.
    • (2001) LNCS , vol.2229 , pp. 1-12
    • Schnorr, C.1
  • 29
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Proceedings of EUROCRYPT'97
    • V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. Proceedings of EUROCRYPT'97, LNCS 1233 (1997), 256-266.
    • (1997) LNCS , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 30
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal based encryption
    • Proceedings of PKC 1998
    • Y. Tsiounis and M. Yung On the security of ElGamal based encryption. Proceedings of PKC 1998, LNCS 1431 (1998), 117-134.
    • (1998) LNCS , vol.1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 31
    • 84946832516 scopus 로고    scopus 로고
    • The exact security of ecies in the generic group model
    • Proceedings of Cryptography and Coding, IMA Int. Conf.
    • N. Smart. The Exact Security of ECIES in the Generic Group Model. Proceedings of Cryptography and Coding, IMA Int. Conf., LNCS 2260 (2001), 73-84.
    • (2001) LNCS , vol.2260 , pp. 73-84
    • Smart, N.1
  • 32
    • 85025802492 scopus 로고    scopus 로고
    • How to strengthen any weakly unforgeable signature into a strongly unforgeable signature
    • Proceedings of CT-RSA 2007
    • R. Steinfeld, J. Pieprzyk and H. Wang. How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Proceedings of CT-RSA 2007, LNCS 4377 (2007), 357-371.
    • (2007) LNCS , vol.4377 , pp. 357-371
    • Steinfeld, R.1    Pieprzyk, J.2    Wang, H.3
  • 33
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Proceedings of CRYPTO 2009
    • B. Waters. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Proceedings of CRYPTO 2009, LNCS 5677 (2009), 619-636.
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.