메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A Contractual Anonymity System

Author keywords

[No Author keywords available]

Indexed keywords

SERVICE PROVIDER; UNLINKABILITY;

EID: 85180530788     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (34)
  • 2
    • 0141559722 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO, 2000.
    • (2000) CRYPTO
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 5
    • 2642534257 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT, 2003.
    • (2003) EUROCRYPT
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 6
    • 14844324877 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT, 2004.
    • (2004) EUROCRYPT
    • Boneh, D.1    Boyen, X.2
  • 8
    • 14844309671 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation
    • D. Boneh and H. Shacham. Group signatures with verifier-local revocation. In CCS, 2004.
    • (2004) CCS
    • Boneh, D.1    Shacham, H.2
  • 10
    • 56649119348 scopus 로고    scopus 로고
    • Enhanced privacy ID: a direct anonymous attestation scheme with enhanced revocation capabilities
    • E. F. Brickell and J. Li. Enhanced privacy ID: a direct anonymous attestation scheme with enhanced revocation capabilities. In Workshop on Privacy in the Electronic Society, 2007.
    • (2007) Workshop on Privacy in the Electronic Society
    • Brickell, E. F.1    Li, J.2
  • 12
    • 3543102859 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO, 2002.
    • (2002) CRYPTO
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 24944577209 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO, 2004.
    • (2004) CRYPTO
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 0002882557 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups (extended abstract)
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups (extended abstract). In CRYPTO, 1997.
    • (1997) CRYPTO
    • Camenisch, J.1    Stadler, M.2
  • 27
    • 85077724590 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. In Computer Networks, 1998.
    • (1998) Computer Networks
    • Smith, S. W.1    Weingart, S.2
  • 28
    • 85015263124 scopus 로고    scopus 로고
    • k-times anonymous authentication (extended abstract)
    • I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In ASIACRYPT, 2004.
    • (2004) ASIACRYPT
    • Teranishi, I.1    Furukawa, J.2    Sako, K.3
  • 29
    • 85094767343 scopus 로고    scopus 로고
    • k-times anonymous authentication with a constant proving cost
    • I. Teranishi and K. Sako. k-times anonymous authentication with a constant proving cost. In Public Key Cryptography, 2006.
    • (2006) Public Key Cryptography
    • Teranishi, I.1    Sako, K.2
  • 31
    • 77952377083 scopus 로고    scopus 로고
    • Blacklistable anonymous credentials: blocking misbehaving users without TTPs
    • P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. Blacklistable anonymous credentials: blocking misbehaving users without TTPs. In CCS, 2007.
    • (2007) CCS
    • Tsang, P. P.1    Au, M. H.2    Kapadia, A.3    Smith, S. W.4
  • 32
    • 85180416174 scopus 로고    scopus 로고
    • PEREA: towards practical TTP-free revocation in anonymous authentication
    • P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. PEREA: towards practical TTP-free revocation in anonymous authentication. In CCS, 2008.
    • (2008) CCS
    • Tsang, P. P.1    Au, M. H.2    Kapadia, A.3    Smith, S. W.4
  • 33
    • 28144436202 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed: May 1, 2009]
    • D. A. Wheeler. Linux kernel 2.6: It’s worth more! [Online]. Available: http://www.dwheeler.com/essays/linux-kernel-cost.html. [Accessed: May 1, 2009].
    • Linux kernel 2.6: It’s worth more!
    • Wheeler, D. A.1
  • 34
    • 85180534024 scopus 로고    scopus 로고
    • XySSL Developers. [Online]. Available
    • XySSL Developers. XySSL cryptographic library. [Online]. Available: http://polarssl.org.
    • XySSL cryptographic library


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.