Universally Composable Direct Anonymous Attestation
暂无分享,去创建一个
[1] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[2] Amit Sahai,et al. Pseudonym Systems (Extended Abstract) , 2000 .
[3] Ran Canetti,et al. Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[4] Aggelos Kiayias,et al. On the Portability of Generalized Schnorr Proofs , 2009, EUROCRYPT.
[5] Amit Sahai,et al. Pseudonym Systems , 1999, Selected Areas in Cryptography.
[6] Georg Fuchsbauer,et al. Anonymous attestation with user-controlled linkability , 2013, International Journal of Information Security.
[7] Liqun Chen,et al. A DAA Scheme Requiring Less TPM Resources , 2009, Inscrypt.
[8] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[9] Li Xi,et al. DAA-Related APIs in TPM 2.0 Revisited , 2014, TRUST.
[10] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[11] Hong-hu Zhen,et al. Bilinear Pairing Based DAA Protocol , 2009, 2009 International Conference on Computational Intelligence and Natural Computing.
[12] Liqun Chen,et al. Pairings in Trusted Computing , 2008, Pairing.
[13] Michael Backes,et al. How to Break and Repair a Universally Composable Signature Functionality , 2004, ISC.
[14] Jiangtao Li,et al. Simplified security notions of direct anonymous attestation and a concrete scheme from pairings , 2009, International Journal of Information Security.
[15] Liqun Chen,et al. DAA: Fixing the pairing based protocols , 2009, IACR Cryptol. ePrint Arch..
[16] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[17] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[18] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[19] Liqun Chen,et al. On Proofs of Security for DAA Schemes , 2008, ProvSec.
[20] Jiangtao Li,et al. A New Direct Anonymous Attestation Scheme from Bilinear Maps , 2008, TRUST.
[21] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[22] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[23] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[24] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[25] Liqun Chen,et al. On the Design and Implementation of an Efficient DAA Scheme , 2010, IACR Cryptol. ePrint Arch..