Revocation of Direct Anonymous Attestation
暂无分享,去创建一个
[1] Jiangtao Li,et al. Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and Attestation , 2010, 2010 IEEE Second International Conference on Social Computing.
[2] Andrew Odlyzko,et al. Advances in Cryptology — CRYPTO’ 86 , 2000, Lecture Notes in Computer Science.
[3] Liqun Chen,et al. On the Design and Implementation of an Efficient DAA Scheme , 2010, IACR Cryptol. ePrint Arch..
[4] A. Maximov,et al. Fast computation of large distributions and its cryptographic applications , 2005 .
[5] Jiangtao Li,et al. A New Direct Anonymous Attestation Scheme from Bilinear Maps , 2008, TRUST.
[6] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[7] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[8] Xiaofeng Chen,et al. Direct Anonymous Attestation for Next Generation TPM , 2008, J. Comput..
[9] Jung Hee Cheon,et al. Security Analysis of the Strong Diffie-Hellman Problem , 2006, EUROCRYPT.
[10] Amit Sahai,et al. Pseudonym Systems , 1999, Selected Areas in Cryptography.
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] Jiangtao Li,et al. Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities , 2007, IEEE Transactions on Dependable and Secure Computing.
[13] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[14] Siaw-Lynn Ng,et al. Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[15] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[16] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[17] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[18] Steven D. Galbraith,et al. Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings , 2008, Pairing.
[19] Liqun Chen,et al. Pairings in Trusted Computing , 2008, Pairing.
[20] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[21] Liqun Chen,et al. A DAA Scheme Requiring Less TPM Resources , 2009, Inscrypt.
[22] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[23] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[24] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[25] Liqun Chen,et al. A DAA Scheme Using Batch Proof and Verification , 2010, TRUST.
[26] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[27] Jiangtao Li,et al. A Pairing-Based DAA Scheme Further Reducing TPM Resources , 2010, TRUST.
[28] Jiangtao Li,et al. Simplified security notions of direct anonymous attestation and a concrete scheme from pairings , 2009, International Journal of Information Security.
[29] Stephen R. Tate,et al. A Direct Anonymous Attestation Scheme for Embedded Devices , 2007, Public Key Cryptography.
[30] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[31] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[32] Ahmad-Reza Sadeghi,et al. Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings , 2008, TRUST.
[33] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[34] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[35] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[36] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[37] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[38] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[39] Nobuo Funabiki,et al. Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[40] Liqun Chen,et al. DAA: Fixing the pairing based protocols , 2009, IACR Cryptol. ePrint Arch..
[41] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .