{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:32:51Z","timestamp":1725514371227},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_15","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T05:27:19Z","timestamp":1181021239000},"page":"177-192","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers"],"prefix":"10.1007","author":[{"given":"Yanjiang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: Privacy in Electronic Commerce and the Economics of Immediate Gratification. In: Proc. ACM. Electronic Commerce (EC 04), pp. 21\u201329 (2004)","DOI":"10.1145\/988772.988777"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proc. ACM Conference on Computer and Communications Security, CCS\u201904, pp. 132\u2013145 (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Balfanz, D., et al.: Secret HandShakes from Pairing-based Key Agreement. In: Proc. IEEE Symposium on Security and Privacy, pp. 180\u2013196 (2003)","DOI":"10.1109\/SECPRI.2003.1199336"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bradshaw, R., Hlot, J., Seamons, K.: Concealing Complex Policies with Hidden Credentials. In: Proc. ACM Conference on Computer and Communication Security, pp. 146\u2013157 (2004)","DOI":"10.1145\/1030083.1030104"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/978-3-540-24632-9_29","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"V. Benjumea","year":"2004","unstructured":"Benjumea, V., et al.: A First Approach to Provide Anonymity in Attribute Certificate. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 402\u2013415. Springer, Heidelberg (2004)"},{"key":"15_CR6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privay","author":"S. Brands","year":"2000","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privay. MIT Press, Cambridge (2000)"},{"issue":"10","key":"15_CR7","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Herreweghen, E.V.: Design and Implementation of the Idemix Anonymous Credential System. In: Proc. ACM Conference on Computer and Communication Security, CCS\u201902 (2002)","DOI":"10.1145\/586110.586114"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","first-page":"93","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"J. Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient Non-Transferable Anonymous Multi-Show Credential System with Optional Anonymity Revocation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 93\u2013118. Springer, Heidelberg (2003)"},{"issue":"6","key":"15_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"15_CR11","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/S1389-1286(98)00018-8","volume":"31","author":"C.M. Cllison","year":"1999","unstructured":"Cllison, C.M.: The Nature of A Usable PKI. Computer Networks\u00a031(8), 823\u2013830 (1999)","journal-title":"Computer Networks"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Ellison, C.M., et al.: SPKI Certificate Theory. In: RFC 2693","DOI":"10.17487\/rfc2693"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., et al.: A Virtual Machine-Based PLatform for Trusted Computing. In: Proc. 9th ACM Symposium on Operating Systems Principles, pp. 193\u2013206 (2003)","DOI":"10.1145\/1165389.945464"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof-systems. In: 17 th ACM Symposium on Theory of Computing, pp. 291\u2013304 (1985)","DOI":"10.1145\/22145.22178"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Holt, J., et al.: Hidden Credentials. In: Proc. ACM Workshop in the Electronic Society, pp. 1\u20138 (2003)","DOI":"10.1145\/1005140.1005142"},{"key":"15_CR16","unstructured":"LaGrande technology architecrure. Intel Developer Forum (2003)"},{"key":"15_CR17","unstructured":"ISO\/IEC 9594-8, Information Technology - Open Systems Interconnections - The Directory: Authentication Framework"},{"key":"15_CR18","unstructured":"ITU-T X.509 Recommandation (2000), available at http:\/\/www.itu.int\/rec\/T-REC-X.509-200003-I\/"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Li, N., Du, W., Boneh, D.: Oblivious Signature-based Envelope. In: Proc. ACM Symposium on Principles of Distributed Computing, pp. 182\u2013189 (2003)","DOI":"10.1145\/872035.872061"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/11496137_21","volume-title":"Applied Cryptography and Network Security","author":"J. Li","year":"2005","unstructured":"Li, J., Oacerts, N.L.: Oblivious Attribute Certificates. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 301\u2013307. Springer, Heidelberg (2005)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Mitchell, C.: Trusted Computing, pp. 115\u2013141. The Instituition of Electronic Engineers, London (2005)","DOI":"10.1049\/PBPC006E"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"15_CR23","unstructured":"Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure (1996), http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi10.html"},{"key":"15_CR24","unstructured":"Seamons, K.E., Winslett, M., Yu, T.: Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. In: Proc. Network and Distributed System Security Symposium (2001)"},{"key":"15_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-41015-8","volume-title":"Trusted Computing Platforms - Design and Applications","author":"S. Smith","year":"2005","unstructured":"Smith, S.: Trusted Computing Platforms - Design and Applications. Springer, Heidelberg (2005)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Zhang, X.: Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: Proc. ACM symposium on Access control models and technologies, pp. 147\u2013158 (2005)","DOI":"10.1145\/1063979.1064005"},{"key":"15_CR27","unstructured":"Sailer, R., et al.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: USENIX Security Symposium, pp. 223\u2013238. USENIX (2004)"},{"key":"15_CR28","unstructured":"Trusted Computing Group, http:\/\/www.trustedcomputinggroup.org"},{"key":"15_CR29","unstructured":"TCG. TPM Main, Part 3 Commands. TCG Specification Ver. 1.2, Revision 62 (2003), http:\/\/www.trustedcomputinggroup.org"},{"key":"15_CR30","unstructured":"World Wide Consortium, http:\/\/www.w3.org"},{"key":"15_CR31","unstructured":"Yu, T., Winslett, M.: A Unified Scheme for Resource Protection in Automated Trust Negotiation. In: IEEE Symposium on Security and Privacy, pp. 110\u2013122 (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:29:18Z","timestamp":1605745758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_15","relation":{},"subject":[]}}