Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator

Loading full text...

Full text loading...

/deliver/fulltext/iet-ifs/14/6/IET-IFS.2018.5505.html;jsessionid=12lvekjcsfrnn.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-ifs.2018.5505&mimeType=html&fmt=ahah

References

    1. 1)
      • 4. Aikou, Y., Sadiah, S., Nakanishi, T.: ‘An efficient blacklistable anonymous credentials without TTPs using pairing-based accumulator’. Proc. 31st IEEE Int. Conf. on Advanced Information Networking and Applications (AINA 2017), Taipei, Taiwan, 2017, pp. 780786.
    2. 2)
      • 3. Yu, K.Y., Yuen, T.H., Chow, S.S., et al: ‘PE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation’. Proc. European Symp. on Research in Computer Security (ESORICS 2012), Pisa, Italy, 2012 (LNCS, 7459), pp. 679696.
    3. 3)
      • 8. Au, M.H., Kapadia, A.: ‘PERM: practical reputation-based blacklisting without TTPs’. Proc. 2012 ACM Conf. on Computer and communications security (ACM-CCS 2012), Raleigh, NC, USA, 2012, pp. 929940.
    4. 4)
      • 12. Camenisch, J., Kohlweiss, M., Soriente, C.: ‘An accumulator based on bilinear maps and efficient revocation for anonymous credentials’. Proc. 12th Int. Conf. on Practice and Theory in Public Key Cryptography (PKC 2009), Irvine, CA, USA, 2009 (LNCS, 5443), pp. 481500.
    5. 5)
      • 17. Camenisch, J., Chaabouni, R., Shelat, A.: ‘Efficient protocols for set membership and range proofs’. Advances in Cryptology, ASIACRYPT 2008, Melbourne, Australia, 2008 (LNCS, 5350), pp. 234252.
    6. 6)
      • 11. Abe, M., Haralambiev, K., Ohkubo, M..: ‘Signing on elements in bilinear groups for modular protocol design’. Report 2010/133, Cryptology ePrint Archive, 2010.
    7. 7)
      • 13. Boneh, D., Boyen, X., Shacham, H.: ‘Short group signatures’. Advances in Cryptology – CRYPTO 2004, Santa Barbara, CA, USA, 2004 (LNCS, 3152), pp. 4155.
    8. 8)
      • 16. Nakanishi, T., Funabiki, N.: ‘An anonymous reputation system with reputation secrecy for manager’, IEICE Trans. Fundam., 2014, 97-A, (12), pp. 23252335.
    9. 9)
      • 10. Nakanishi, T., Kanatani, T.: ‘An efficient blacklistable anonymous credential system with reputation using pairing-based accumulator’. Proc. 17th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom 2018), New York, NY, USA, 2018, pp. 11401148.
    10. 10)
      • 7. Au, M.H., Kapadia, A., Susilo, W.: ‘BLACR: TTP-free blacklistable anonymous credentials with reputation’. Proc. 19th Annual Network and Distributed System Security Symp. (NDSS 2012), San Diego, CA, USA, 2012.
    11. 11)
      • 5. Tsang, P.P., Au, M.H., Kapadia, A., et al: ‘BLAC: revoking repeatedly misbehaving anonymous users without relying on TTPs’, ACM Trans. Inf. Syst. Secur., 2010, 13, (4), pp. 39:139:33.
    12. 12)
      • 9. Xi, L., Feng, D.: ‘FARB: fast anonymous reputation-based blacklisting without TTPs’. Proc. 13th Workshop on Privacy in the Electronic Society (WPES 2014), Scottsdale, AZ, USA, 2014, pp. 139148.
    13. 13)
      • 6. Au, M.H., Tsang, P.P., Kapadia, A.: ‘PEREA: practical TTP-free revocation of repeatedly misbehaving anonymous users’, ACM Trans. Inf. Syst. Secur., 2011, 14, (4), pp. 29:129:34.
    14. 14)
      • 2. Tsang, P.P., Au, M.H., Kapadia, A., et al: ‘PEREA: towards practical TTP-free revocation in anonymous authentication’. Proc. ACM Conf. on Computer and Communications Security (ACM-CCS'08), Alexandria, VA, USA, 2008, pp. 333344.
    15. 15)
      • 15. Sudarsono, A., Nakanishi, T., Funabiki, N.: ‘Efficient proofs of attributes in pairing-based anonymous credential system’. Proc. 11th Privacy Enhancing Technologies Symp. (PETS 2011), Waterloo, ON, Canada, 2011 (LNCS, 6794), pp. 246263.
    16. 16)
      • 14. Pedersen, T.P.: ‘Non-interactive and information-theoretic secure verifiable secret sharing’. Advances in Cryptology (CRYPTO'91), Santa Barbara, CA, USA, 1992 (LNCS, 576), pp. 129140.
    17. 17)
      • 1. Tsang, P.P., Au, M.H., Kapadia, A., et al: ‘Blacklistable anonymous credentials: blocking misbehaving users without TPPs’. Proc. ACM Conf. on Computer and Communications Security 2007 (ACM-CCS'07), Alexandria, VA, USA, 2007, pp. 7281.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2018.5505
Loading

Related content

content/journals/10.1049/iet-ifs.2018.5505
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address