메뉴 건너뛰기




Volumn 10, Issue 1, 2015, Pages 178-189

Time-bound anonymous authentication for roaming networks

Author keywords

Accountable privacy; anonymous roaming; applied cryptography; authentication; privacy; revocation

Indexed keywords

DATA PRIVACY;

EID: 84919819096     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2366300     Document Type: Article
Times cited : (55)

References (33)
  • 2
    • 84872612220 scopus 로고    scopus 로고
    • Doubletrapdoor anonymous tags for traceable signatures
    • M. Abe, S. S. M. Chow, K. Haralambiev, and M. Ohkubo, "Doubletrapdoor anonymous tags for traceable signatures," Int. J. Inf. Secur., vol. 12, no. 1, pp. 19-31, 2013.
    • (2013) Int. J. Inf. Secur. , vol.12 , Issue.1 , pp. 19-31
    • Abe, M.1    Chow, S.S.M.2    Haralambiev, K.3    Ohkubo, M.4
  • 3
    • 84883290441 scopus 로고    scopus 로고
    • Accumulators and U-prove revocation
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • T. Acar, S. S. M. Chow, and L. Nguyen, "Accumulators and U-prove revocation," in Financial Cryptography and Data Security. (Lecture Notes in Computer Science), vol. 7859. Berlin, Germany: Springer-Verlag, 2013, pp. 189-196.
    • (2013) Financial Cryptography and Data Security. , vol.7859 , pp. 189-196
    • Acar, T.1    Chow, S.S.M.2    Nguyen, L.3
  • 4
    • 85168123147 scopus 로고    scopus 로고
    • BLACR: TTP-free blacklistable anonymous credentials with reputation
    • M. H. Au, A. Kapadia, and W. Susilo, "BLACR: TTP-free blacklistable anonymous credentials with reputation," in Proc. 19th NDSS, 2012, pp. 1-17.
    • (2012) Proc. 19th NDSS , pp. 1-17
    • Au, M.H.1    Kapadia, A.2    Susilo, W.3
  • 5
    • 84871816306 scopus 로고    scopus 로고
    • Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
    • Jan.
    • M. H. Au, J. K. Liu, W. Susilo, and T. H. Yuen, "Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction," Theoretical Comput. Sci., vol. 469, pp. 1-14, Jan. 2013.
    • (2013) Theoretical Comput. Sci. , vol.469 , pp. 1-14
    • Au, M.H.1    Liu, J.K.2    Susilo, W.3    Yuen, T.H.4
  • 6
    • 84875252646 scopus 로고    scopus 로고
    • Constant-size dynamic k-times anonymous authentication
    • Jun.
    • M. H. Au, W. Susilo, Y. Mu, and S. S. M. Chow, "Constant-size dynamic k-times anonymous authentication," IEEE Syst. J., vol. 7, no. 2, pp. 249-261, Jun. 2013.
    • (2013) IEEE Syst. J. , vol.7 , Issue.2 , pp. 249-261
    • Au, M.H.1    Susilo, W.2    Mu, Y.3    Chow, S.S.M.4
  • 7
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2656. Berlin, Germany: Springer-Verlag, 2003, pp. 614-629.
    • (2003) Advances in Cryptology , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 8
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • D. Boneh and X. Boyen, "Short signatures without random oracles," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3027. Berlin, Germany: Springer-Verlag, 2004, pp. 56-73.
    • (2004) Advances in Cryptology , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 9
    • 14844309671 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation
    • D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in Proc. 11th ACM Conf. CCS, 2004, pp. 168-177.
    • (2004) Proc. 11th ACM Conf. CCS , pp. 168-177
    • Boneh, D.1    Shacham, H.2
  • 10
    • 84863345554 scopus 로고    scopus 로고
    • Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
    • May/Jun.
    • E. Brickell and J. Li, "Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities," IEEE Trans. Dependable Secure Comput., vol. 9, no. 3, pp. 345-360, May/Jun. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput. , vol.9 , Issue.3 , pp. 345-360
    • Brickell, E.1    Li, J.2
  • 11
    • 84867653103 scopus 로고    scopus 로고
    • VLR group signatures-How to achieve both backward unlinkability and efficient revocation checks
    • J. Bringer and A. Patey, "VLR group signatures-How to achieve both backward unlinkability and efficient revocation checks," in Proc. SECRYPT, 2012, pp. 215-220.
    • (2012) Proc. SECRYPT , pp. 215-220
    • Bringer, J.1    Patey, A.2
  • 12
    • 85024290278 scopus 로고
    • Group signatures
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • D. Chaum and E. van Heyst, "Group Signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 547. Berlin, Germany: Springer-Verlag, 1991, pp. 257-265.
    • (1991) Advances in Cryptology , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 13
    • 78649247782 scopus 로고    scopus 로고
    • VLR group signatures with indisputable exculpability and efficient revocation
    • Aug.
    • L. Chen and J. Li, "VLR group signatures with indisputable exculpability and efficient revocation," in Proc. IEEE 2nd Int. Conf. SocialCom, Aug. 2010, pp. 727-734.
    • (2010) Proc. IEEE 2nd Int. Conf. SocialCom , pp. 727-734
    • Chen, L.1    Li, J.2
  • 14
    • 79951969637 scopus 로고    scopus 로고
    • Threshold anonymous announcement in VANETs
    • Mar.
    • L. Chen, S.-L. Ng, and G. Wang, "Threshold anonymous announcement in VANETs," IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 605-615, Mar. 2011.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.3 , pp. 605-615
    • Chen, L.1    Ng, S.-L.2    Wang, G.3
  • 15
    • 70549093018 scopus 로고    scopus 로고
    • Real traceable signatures
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • S. S. M. Chow, "Real traceable signatures," in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 5867. Berlin, Germany: Springer-Verlag, 2009, pp. 92-107.
    • (2009) Selected Areas in Cryptography , vol.5867 , pp. 92-107
    • Chow, S.S.M.1
  • 16
    • 84887308796 scopus 로고    scopus 로고
    • Escrowed linkability of ring signatures and its applications
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • S. S. M. Chow, W. Susilo, and T. H. Yuen, "Escrowed linkability of ring signatures and its applications," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 4341. Berlin, Germany: Springer-Verlag, 2006, pp. 175-192.
    • (2006) Progress in Cryptology , vol.4341 , pp. 175-192
    • Chow, S.S.M.1    Susilo, W.2    Yuen, T.H.3
  • 19
    • 37549017388 scopus 로고    scopus 로고
    • Trust-based fast authentication for multiowner wireless networks
    • Feb.
    • J. Hassan, H. Sirisena, and B. Landfeldt, "Trust-based fast authentication for multiowner wireless networks," IEEE Trans. Mobile Comput., vol. 7, no. 2, pp. 247-261, Feb. 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.2 , pp. 247-261
    • Hassan, J.1    Sirisena, H.2    Landfeldt, B.3
  • 20
    • 79951676054 scopus 로고    scopus 로고
    • Privacy-preserving universal authentication protocol for wireless communications
    • Feb.
    • D. He, J. Bu, S. Chan, C. Chen, and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 431-436, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.2 , pp. 431-436
    • He, D.1    Bu, J.2    Chan, S.3    Chen, C.4    Yin, M.5
  • 21
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Sep.
    • Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569-2577, Sep. 2006.
    • (2006) IEEE Trans. Wireless Commun. , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 22
    • 19944362854 scopus 로고    scopus 로고
    • A new delegation-based authentication protocol for use in portable communication systems
    • Jan.
    • W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, Jan. 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.1 , pp. 57-64
    • Lee, W.-B.1    Yeh, C.-K.2
  • 23
    • 71549128039 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation and backward unlinkability in the standard model
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • B. Libert and D. Vergnaud, "Group signatures with verifier-local revocation and backward unlinkability in the standard model," in Cryptology and Network Security (Lecture Notes in Computer Science), vol. 5888. Berlin, Germany: Springer-Verlag, 2009, pp. 498-517.
    • (2009) Cryptology and Network Security , vol.5888 , pp. 498-517
    • Libert, B.1    Vergnaud, D.2
  • 24
    • 80052825573 scopus 로고    scopus 로고
    • Reducing communication overhead for nested NEMO networks: Roaming authentication and access control structure
    • Sep.
    • H.-J. Lim, M. Kim, J.-H. Lee, D.-H. Seo, and T. M. Chung, "Reducing communication overhead for nested NEMO networks: Roaming authentication and access control structure," IEEE Trans. Veh. Technol., vol. 60, no. 7, pp. 3408-3423, Sep. 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.60 , Issue.7 , pp. 3408-3423
    • Lim, H.-J.1    Kim, M.2    Lee, J.-H.3    Seo, D.-H.4    Chung, T.M.5
  • 25
    • 26444581774 scopus 로고    scopus 로고
    • An efficient solution to the Millionaires' problem based on homomorphic encryption
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • H.-Y. Lin and W.-G. Tzeng, "An efficient solution to the Millionaires' problem based on homomorphic encryption," in Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 3531. Berlin, Germany: Springer-Verlag, 2005, pp. 456-466.
    • (2005) Applied Cryptography and Network Security , vol.3531 , pp. 456-466
    • Lin, H.-Y.1    Tzeng, W.-G.2
  • 27
    • 33646771737 scopus 로고    scopus 로고
    • Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • T. Nakanishi and N. Funabiki, "Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3788. Berlin, Germany: Springer-Verlag, 2005, pp. 533-548.
    • (2005) Advances in Cryptology , vol.3788 , pp. 533-548
    • Nakanishi, T.1    Funabiki, N.2
  • 28
    • 33845276220 scopus 로고    scopus 로고
    • A short verifier-local revocation group signature scheme with backward unlinkability
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • T. Nakanishi and N. Funabiki, "A short verifier-local revocation group signature scheme with backward unlinkability," in Advances in Information and Computer Security (Lecture Notes in Computer Science), vol. 4266. Berlin, Germany: Springer-Verlag, 2006, pp. 17-32.
    • (2006) Advances in Information and Computer Security , vol.4266 , pp. 17-32
    • Nakanishi, T.1    Funabiki, N.2
  • 29
    • 24144480841 scopus 로고    scopus 로고
    • Accumulators from bilinear pairings and applications
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • L. Nguyen, "Accumulators from bilinear pairings and applications," in Topics in Cryptology (Lecture Notes in Computer Science), vol. 3376. Berlin, Germany: Springer-Verlag, 2005, pp. 275-292.
    • (2005) Topics in Cryptology , vol.3376 , pp. 275-292
    • Nguyen, L.1
  • 30
    • 11944251256 scopus 로고    scopus 로고
    • Anonymous wireless authentication on a portable cellular mobile system
    • Oct.
    • S.-J. Wang, "Anonymous wireless authentication on a portable cellular mobile system," IEEE Trans. Comput., vol. 53, no. 10, pp. 1317-1329, Oct. 2004.
    • (2004) IEEE Trans. Comput. , vol.53 , Issue.10 , pp. 1317-1329
    • Wang, S.-J.1
  • 31
    • 74549210063 scopus 로고    scopus 로고
    • Universal authentication protocols for anonymous wireless communications
    • Jan.
    • G. Yang, Q. Huang, D. S. Wong, and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 168-174, Jan. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.1 , pp. 168-174
    • Yang, G.1    Huang, Q.2    Wong, D.S.3    Deng, X.4
  • 32
    • 84865583485 scopus 로고    scopus 로고
    • PE(AR)2: Privacy-enhanced anonymous authentication with reputation and revocation
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • K. Y. Yu, T. H. Yuen, S. S. M. Chow, S. M. Yiu, and L. C. K. Hui, "PE(AR)2: Privacy-enhanced anonymous authentication with reputation and revocation," in Computer Security (Lecture Notes in Computer Science), vol. 7459. Berlin, Germany: Springer-Verlag, 2012, pp. 679-696.
    • (2012) Computer Security , vol.7459 , pp. 679-696
    • Yu, K.Y.1    Yuen, T.H.2    Chow, S.S.M.3    Yiu, S.M.4    Hui, L.C.K.5
  • 33
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Mar.
    • M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.