References
- S. Brands, 'A Technical Overview of Digital Credentials.' Preprint, 2002
- J. Camenisch and A. Lysyanskaya, 'An Effieient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation:' Advances in Cryptology - Eurocrypt 2001, SpringerVerlag, LNCS Vol. 2045, pp. 93-118, 2001
- E. Verheul. 'Self-Blindable Credential Certificates from the Weil Pairing,' Asia-crypt 2001, Springer-Verleg, LNCS Vol. 2248, pp. 533-551, 2001
- 'Security wihout Identification: Transaction Systems to Make Big Brother Obsolete:' Communications of the AGM, Vol. 28, No. 10, pp. 1030-1044, 1985
- D. Chaum and J. Evertse, 'A Secure and Privacy-protecting Protocol for Transmitting Personal Information between Organizations,' Advances in Cryptology Crypto'86, Springer-Verlag, LNCS Vol. 740, pp. 118-167, 1987
- I. Damgard, 'Efficient Concurrent Zeroknowledge in the Auxiliary String Model.' Advances in Cryptology - Eurocrypt 2000, Springer-Verlag, LNCS Vol. 1807, pp. 431-444, 2000
- L. Chen, 'Access with Pseudonyms:' Cryptogaphy: Polish and Algorithms, Springer-Verlag, LNCS Vol. 1029. pp. 232-243, 1995
- A. Lysyanskyaya. R. Rivest, A. Sahai. and S. Wolf. 'pseudonym Systems,' Selected Areas in Cryptography, SpringerVerlag, LNCS Vol. 1758, 1999
- T. Kwon, J. Cheon, Y. Kim and C. Chung, 'A Traceable X.509 Pseudonym Certificate for RSA-based PKI,' in submission and available from http://dasan. sejong. ac.kr/-tkwon/research/pseudonyml. pdf. 2003
- T. Kwon, J, Cheon. and Y. Kim. 'Anonymous Certificate and its Application.' in preparation and available from http://dasan, sejong. ac.kr/-tkwon/research/pseudonym2.pdf, 2004