{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:05:49Z","timestamp":1725494749569},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540769682"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76969-9_17","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T06:32:49Z","timestamp":1195021969000},"page":"265-281","source":"Crossref","is-referenced-by-count":12,"title":["Anonymity 2.0 \u2013 X.509 Extensions Supporting Privacy-Friendly Authentication"],"prefix":"10.1007","author":[{"given":"Vicente","family":"Benjumea","sequence":"first","affiliation":[]},{"given":"Seung Geol","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Camenish, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 255\u2013270. Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-44598-6_16"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Tsudik, G.: Some open issues and new directions in group signatures. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 196\u2013211. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48390-X_15"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Benjumea, V., Lopez, J., Montenegro, J.A., Troya, J.M.: A first approach to provide anonymity in attribute certificates. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 402\u2013415. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24632-9_29"},{"issue":"2","key":"17_CR4","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1108\/10662240610656474","volume":"16","author":"V. Benjumea","year":"2006","unstructured":"Benjumea, V., Lopez, J., Troya, J.M.: Anonymous attribute certificates based on traceable signatures. Internet Research\u00a016(2), 120\u2013139 (2006)","journal-title":"Internet Research"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates Building in Privacy, The MIT Press, Cambridge (August 2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44987-6_7"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R., Sherman, A. (eds.) CRYPTO 1982: Advances in Cryptology, pp. 199\u2013203. Plenum Press, Santa Barbara, CA (August 1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"10","key":"17_CR8","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Chaum, D., Evertse, J.H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 118\u2013170. Springer, Heidelberg (1987)","DOI":"10.1007\/3-540-47721-7_10"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)","DOI":"10.1007\/3-540-46416-6_22"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Chen, L.: Access with pseudonyms. In: Dawson, E.P., Goli\u0107, J.D. (eds.) Cryptography: Policy and Algorithms. LNCS, vol.\u00a01029, pp. 232\u2013243. Springer, Heidelberg (1996)","DOI":"10.1007\/BFb0032362"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Choi, S.G., Park, K., Yung, M.: Short traceable signatures based on bilinear pairings. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 88\u2013103. Springer, Heidelberg (2006)","DOI":"10.1007\/11908739_7"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: RFC-4346. The Transport Layer Security (TLS) Protocol. The Internet Society (April 2006)","DOI":"10.17487\/rfc4346"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in Ad Hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 609\u2013626. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Ellison, C.: RFC-2692. SPKI requirements. IETF SPKI Working Group (September 1999)","DOI":"10.17487\/rfc2692"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: RFC-2693. SPKI certificate theory. IETF SPKI Working Group (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Farrel, S., Housley, R.: RFC-3281. An Internet Attribute Certificate Profile for Authorization. The Internet Society (April 2002)","DOI":"10.17487\/rfc3281"},{"key":"17_CR18","unstructured":"FIPS 186. Digital Signature Standard. U.S. Department of Commerce\/N.I.S.T., National Technical Information Service, Springfield, Virginia (1994)"},{"key":"17_CR19","unstructured":"Freier, A., Karlton, P., Kocher, P.: The SSL Protocol. Netscape (November 1996)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: RFC-3280. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. The Internet Society (April 2002)","DOI":"10.17487\/rfc3280"},{"key":"17_CR21","unstructured":"Identity 2.0, http:\/\/www.identity20.com\/"},{"key":"17_CR22","unstructured":"ITU-T Recommendation X.509. Information Technology - Open systems interconnection - The Directory: Authentication Framework (June 1997)"},{"key":"17_CR23","unstructured":"ITU-T Recommendation X.509. Information Technology - Open systems interconnection - The Directory: Public-key and attribute certificate frameworks (March 2000)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 571\u2013589. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_34"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol.\u00a01758, Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-46513-8_14"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: RFC-2560. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. The Internet Society (June 1999)","DOI":"10.17487\/rfc2560"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 372\u2013386. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-30539-2_26"},{"issue":"4","key":"17_CR28","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1145\/950191.950193","volume":"6","author":"P. Persiano","year":"2003","unstructured":"Persiano, P., Visconti, I.: A secure and private system for subscription-based remote services. ACM Trans. on Information and System Security\u00a06(4), 472\u2013500 (2003)","journal-title":"ACM Trans. on Information and System Security"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Persiano, P., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 196\u2013211. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-27809-2_21"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013565. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"issue":"2","key":"17_CR31","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Schechter, S., Parnell, T., Hartemink, A.: Anonymous authentication of membership in dynamic groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 184\u2013195. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48390-X_14"},{"issue":"4","key":"17_CR33","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1145\/330382.330384","volume":"2","author":"S.G. Stubblebine","year":"1999","unstructured":"Stubblebine, S.G., Syverson, P.F., Goldschlag, D.M.: Unlinkable serial transactions: Protocols and applications. ACM Trans. on Information and System Security\u00a02(4), 354\u2013389 (1999)","journal-title":"ACM Trans. on Information and System Security"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Verheul, E.R.: Self-blindable credential certificates from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 533\u2013551. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45682-1_31"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76969-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T16:34:24Z","timestamp":1630082064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76969-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540769682"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76969-9_17","relation":{},"subject":[]}}