메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 180-196

Secret handshakes from pairing-based key agreements

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 84954406641     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199336     Document Type: Conference Paper
Times cited : (55)

References (30)
  • 5
    • 85012908743 scopus 로고
    • One-way accumulators: A decentralized alternative to digital signatures
    • T. Helleseth, editor, Advances in Cryptology - EUROCRYPT ' 93, International Association for Cryptologic Research, Springer- Verlag, Berlin Germany, Extended abstract
    • J. Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT ' 93, vol ume 765 of Lecture Notes in Computer Science, pages 274-285. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1994. Extended abstract.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 274-285
    • Benaloh, J.1    De Mare, M.2
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Proc. CRYPTO 01, Springer-Verlag
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proc. CRYPTO 01, pages 213-229. Springer-Verlag, 2001. LNCS 2139.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • ASIACRYPT01: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology. Springer-Verlag
    • D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. In ASIACRYPT01: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology. LNCS, Springer-Verlag, 2001.
    • (2001) LNCS
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 8
    • 84855307917 scopus 로고
    • Restrictive binding of secret-key certificates
    • L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology - EUROCRYPT 95, Springer-Verlag, 21-25 May
    • S. Brands. Restrictive binding of secret-key certificates. In L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology - EUROCRYPT 95, volume 921 of Lecture Notes in Computer Science, pages 231-247. Springer-Verlag, 21-25 May 1995.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 231-247
    • Brands, S.1
  • 9
    • 84945135810 scopus 로고    scopus 로고
    • Efficient nontransferable anonymous multishow credential system with optional anonymity revocation
    • Proc. EUROCRYPT 00, Springer-Verlag
    • J. Camenisch and A. Lysyanskaya. Efficient nontransferable anonymous multishow credential system with optional anonymity revocation. In Proc. EUROCRYPT 00, pages 93-118. Springer-Verlag, 2001. LNCS 2045.
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology Crypto 2002, pages 61-76, 2002.
    • (2002) Advances in Cryptology Crypto 2002 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, Oct 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 14
    • 85024290278 scopus 로고
    • Group signatures
    • Proc. EUROCRYPT 91, Springer-Verlag
    • D. Chaum and E. van Heijst. Group signatures. In Proc. EUROCRYPT 91, pages 257-265. Springer-Verlag, 1991. LNCS 547.
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heijst, E.2
  • 15
    • 84985922619 scopus 로고
    • Tracing traitors
    • Y. G. Desmedt, editor, Proc. CRYPTO 94, Springer
    • B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Y. G. Desmedt, editor, Proc. CRYPTO 94, pages 257-270. Springer, 1994. Lecture Notes in Computer Science No. 839.
    • (1994) Lecture Notes in Computer Science , Issue.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 16
    • 0004035649 scopus 로고    scopus 로고
    • IETF - Network Working Group, The Internet Society, January RFC 2246
    • T. Dierks and C. Allen. The TLS Protocol Version 1.0. IETF - Network Working Group, The Internet Society, January 1999. RFC 2246.
    • (1999) The TLS Protocol Version 1.0
    • Dierks, T.1    Allen, C.2
  • 18
  • 20
    • 0004115841 scopus 로고    scopus 로고
    • IETF - Network Working Group, The Internet Society, November RFC 2409
    • D. Harkins and D. Carrel. The Internet Key Exchange (IKE). IETF - Network Working Group, The Internet Society, November 1998. RFC 2409.
    • (1998) The Internet Key Exchange (IKE)
    • Harkins, D.1    Carrel, D.2
  • 21
    • 0037974305 scopus 로고    scopus 로고
    • Exponent group signature schemes and efficient identity based signature schemes based on pairings
    • Report
    • F. Hess. Exponent group signature schemes and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002/012, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive
    • Hess, F.1
  • 22
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • U. Maurer, editor, Advances in Cryptology - EUROCRYPT 96, Springer-Verlag, 12-16 May
    • M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In U. Maurer, editor, Advances in Cryptology - EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, pages 143-154. Springer-Verlag, 12-16 May 1996.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 28
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G. R. Blakley and D. C. Chaum, editors, Proc. CRYPTO 84, Springer
    • A. Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and D. C. Chaum, editors, Proc. CRYPTO 84, pages 47-53. Springer, 1985. Lecture Notes in Computer Science No. 196.
    • (1985) Lecture Notes in Computer Science , Issue.196 , pp. 47-53
    • Shamir, A.1
  • 29
    • 84946849368 scopus 로고    scopus 로고
    • Self-blindable credential certificates from the weil pairing
    • E. Verheul. Self-blindable credential certificates from the weil pairing. In Advances in Cryptology Asiacrypt 2001, pages 533-551, 2001.
    • (2001) Advances in Cryptology Asiacrypt 2001 , pp. 533-551
    • Verheul, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.