1 |
D. Chaum and J.H. Evertse, "A secure and privacy protecting protocol for transmitting personal information between organizations," CRYPTO'86, LNCS 263, pp. 118-167, 1986
|
2 |
I.B. Damgard, "Payment systems and credential mechanisms with provable security against abuse by individuals," CRYPTO'88, LNCS 403, pp. 328-335, 1988
|
3 |
L. Chen, "Access with pseudonyms," Cryptography: Policy and Algorithms, LNCS 1029, pp. 232-243, 1995
|
4 |
J. Camenisch and A. Lysyanskaya, "An efficient system for non-transferable anonymous credentials with optional anonymity revocation," EUROCRYPT'01, LNCS 2045, pp. 93-118, 2001
|
5 |
G. Brassard, C. Crpeau, and J.M. Robert, "All-or-nothing disclosure of secrets," CRYPTO'86, LNCS 263, pp. 234–238, 1986
|
6 |
Y. Mu, J. Zhang, and V. Varadharajan, "m out of n oblivious transfer," Australasian Conference on Information Security and Privacy, LNCS 2384, pp. 395-405, 2002
|
7 |
A. Lysyanskaya, R.L. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," Workshop on Selected Areas in Cryptography 1999, LNCS 1758, pp. 184-199, 1999
|
8 |
권태경, 박해룡, 이철수, "공개키 기반 구조에 기반한 익명게시판 기술 현황," 정보보호학회지, 14(6), pp. 1-13, 2004년 12월
|
9 |
D. Chaum, "Security without identification transaction systems to make Big Brother obsolete," Communications of the ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985
DOI
ScienceOn
|
10 |
V. Benjumea, J. Lopez, J.A. Montenegro, and J.M. Troya, "A First Approach to Provide Anonymity in Attribute Certificates," PKC 2004, LNCS 2947, pp. 402-415, 2004
|
11 |
P.P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, "Blacklistable anonymous credentials: blocking misbehaving users without TTP," ACM Conference on Computer and Communications Security 2007, pp. 72-81, Oct. 2007
DOI
|
12 |
양대헌, 이경희, "추적 가능한 가명 은밀 획득 프로토콜," 정보보호학회논문지, 16(5), pp. 113-118, 2006년 10월
|
13 |
M. Jakobsson, A. Juels, and P. Syverson, "Universal re-encryption for mixnets," RSA Conference 2004, Cryptographer's track, LNCS 2964, pp. 163-178, 2004
|
14 |
M. Layouni and H. Vangheluwe, "Anonymousk-show credentials," EuroPKI'07, LNCS 4582, pp. 181–192, 2007
|
15 |
T. Kwon, J.H. Cheon, Y. Kim, and J. Lee, "Privacy Protection in PKIs: A Separation-of-Authority Approach," International Workshop on Information Security Applications, LNCS 4298, pp. 297-311, 2007
|