{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:10:49Z","timestamp":1777129849668,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030103","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"132-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":565,"title":["Direct anonymous attestation"],"prefix":"10.1145","author":[{"given":"Ernie","family":"Brickell","sequence":"first","affiliation":[{"name":"Intel Corporation"}]},{"given":"Jan","family":"Camenisch","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[{"name":"HP Laboratories"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"255","volume-title":"Advances in Cryptology --- CRYPTO2000","author":"Ateniese G.","year":"2000","unstructured":"G. Ateniese , J. Camenisch , M. Joye , and G. Tsudik . A practical and provably secure coalition-resistant group signature scheme . In M. Bellare, editor, Advances in Cryptology --- CRYPTO2000 , volume 1880 of LNCS , pages 255 -- 270 . Springer Verlag , 2000 .]] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare, editor, Advances in Cryptology --- CRYPTO2000, volume 1880 of LNCS, pages 255--270. Springer Verlag, 2000.]]"},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology --- EUROCRYPT '98","author":"Bellare M.","year":"1998","unstructured":"M. Bellare , J. A. Garay , and T. Rabin . Fast batch verification for modular exponentiation and digital signatures . In K. Nyberg, editor, Advances in Cryptology --- EUROCRYPT '98 , volume 1403 of LNCS , pages 236 -- 250 . Springer Verlag , 1998 .]] M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In K. Nyberg, editor, Advances in Cryptology --- EUROCRYPT '98, volume 1403 of LNCS, pages 236--250. Springer Verlag, 1998.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"Manuscript","author":"Boneh D.","year":"2003","unstructured":"D. Boneh , E. Brickell , L. Chen , and H. Shacham . Set signatures . Manuscript , 2003 .]] D. Boneh, E. Brickell, L. Chen, and H. Shacham. Set signatures. Manuscript, 2003.]]"},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","first-page":"431","volume-title":"Advances in Cryptology --- EUROCRYPT","author":"Boudot F.","year":"2000","unstructured":"F. Boudot . Efficient proofs that a committed number lies in an interval . In B. Preneel, editor, Advances in Cryptology --- EUROCRYPT 2000 , volume 1807 of LNCS , pages 431 -- 444 . Springer Verlag , 2000.]] F. Boudot. Efficient proofs that a committed number lies in an interval. In B. Preneel, editor, Advances in Cryptology --- EUROCRYPT 2000, volume 1807 of LNCS, pages 431--444. Springer Verlag, 2000.]]"},{"key":"e_1_3_2_1_5_1","volume-title":"Apr.","author":"Brickell E.","year":"2003","unstructured":"E. Brickell . An efficient protocol for anonymously providing assurance of the container of a private key. Submitted to the Trusted Computing Group , Apr. 2003 .]] E. Brickell. An efficient protocol for anonymously providing assurance of the container of a private key. Submitted to the Trusted Computing Group, Apr. 2003.]]"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-48184-2_11","volume-title":"Advances in Cryptology --- CRYPTO '87","author":"Brickell E. F.","year":"1988","unstructured":"E. F. Brickell , D. Chaum , I. B. Damg\u00e5rd , and J. van de Graaf . Gradual and verifiable release of a secret . In C. Pomerance, editor, Advances in Cryptology --- CRYPTO '87 , volume 293 of LNCS , pages 156 -- 166 . Springer-Verlag , 1988 .]] E. F. Brickell, D. Chaum, I. B. Damg\u00e5rd, and J. van de Graaf. Gradual and verifiable release of a secret. In C. Pomerance, editor, Advances in Cryptology --- CRYPTO '87, volume 293 of LNCS, pages 156--166. Springer-Verlag, 1988.]]"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"93","volume-title":"Advances in Cryptology --- EUROCRYPT","author":"Camenisch J.","year":"2001","unstructured":"J. Camenisch and A. Lysyanskaya . Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation . In B. Pfitzmann, editor, Advances in Cryptology --- EUROCRYPT 2001 , volume 2045 of LNCS , pages 93 -- 118 . Springer Verlag , 2001.]] J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In B. Pfitzmann, editor, Advances in Cryptology --- EUROCRYPT 2001, volume 2045 of LNCS, pages 93--118. Springer Verlag, 2001.]]"},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","first-page":"61","volume-title":"Advances in Cryptology --- CRYPTO","author":"Camenisch J.","year":"2002","unstructured":"J. Camenisch and A. Lysyanskaya . Dynamic accumulators and application to efficient revocation of anonymous credentials . In M. Yung, editor, Advances in Cryptology --- CRYPTO 2002 , volume 2442 of LNCS , pages 61 -- 76 . Springer Verlag , 2002.]] J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In M. Yung, editor, Advances in Cryptology --- CRYPTO 2002, volume 2442 of LNCS, pages 61--76. Springer Verlag, 2002.]]"},{"key":"e_1_3_2_1_9_1","series-title":"LNCS","first-page":"268","volume-title":"Security in Communication Networks","author":"Camenisch J.","year":"2002","unstructured":"J. Camenisch and A. Lysyanskaya . A signature scheme with efficient protocols . In S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks , Third International Conference, SCN 2002 , volume 2576 of LNCS , pages 268 -- 289 . Springer Verlag , 2003.]] J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of LNCS, pages 268--289. Springer Verlag, 2003.]]"},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","first-page":"160","volume-title":"Advances in Cryptology --- ASIACRYPT '98","author":"Camenisch J.","year":"1998","unstructured":"J. Camenisch and M. Michels . A group signature scheme with improved efficiency . In K. Ohta and D. Pei, editors, Advances in Cryptology --- ASIACRYPT '98 , volume 1514 of LNCS , pages 160 -- 174 . Springer Verlag , 1998 .]] J. Camenisch and M. Michels. A group signature scheme with improved efficiency. In K. Ohta and D. Pei, editors, Advances in Cryptology --- ASIACRYPT '98, volume 1514 of LNCS, pages 160--174. Springer Verlag, 1998.]]"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/3-540-48910-X_8","volume-title":"Advances in Cryptology --- EUROCRYPT '99","author":"Camenisch J.","year":"1999","unstructured":"J. Camenisch and M. Michels . Proving in zero-knowledge that a number $n$ is the product of two safe primes . In J. Stern, editor, Advances in Cryptology --- EUROCRYPT '99 , volume 1592 of LNCS , pages 107 -- 122 . Springer Verlag , 1999 .]] J. Camenisch and M. Michels. Proving in zero-knowledge that a number $n$ is the product of two safe primes. In J. Stern, editor, Advances in Cryptology --- EUROCRYPT '99, volume 1592 of LNCS, pages 107--122. Springer Verlag, 1999.]]"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/3-540-48405-1_27","volume-title":"Advances in Cryptology --- CRYPTO '99","author":"Camenisch J.","year":"1999","unstructured":"J. Camenisch and M. Michels . Separability and efficiency for generic group signature schemes . In M. Wiener, editor, Advances in Cryptology --- CRYPTO '99 , volume 1666 of LNCS , pages 413 -- 430 . Springer Verlag , 1999 .]] J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In M. Wiener, editor, Advances in Cryptology --- CRYPTO '99, volume 1666 of LNCS, pages 413--430. Springer Verlag, 1999.]]"},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"126","volume-title":"Advances in Cryptology --- CRYPTO","author":"Camenisch J.","year":"2003","unstructured":"J. Camenisch and V. Shoup . Practical verifiable encryption and decryption of discrete logarithms . In D. Boneh, editor, Advances in Cryptology --- CRYPTO 2003 , volume 2729 of LNCS , pages 126 -- 144 , 2003.]] J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In D. Boneh, editor, Advances in Cryptology --- CRYPTO 2003, volume 2729 of LNCS, pages 126--144, 2003.]]"},{"key":"e_1_3_2_1_14_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology --- CRYPTO '97","author":"Camenisch J.","year":"1997","unstructured":"J. Camenisch and M. Stadler . Efficient group signature schemes for large groups . In B. Kaliski, editor, Advances in Cryptology --- CRYPTO '97 , volume 1296 of LNCS , pages 410 -- 424 . Springer Verlag , 1997 .]] J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski, editor, Advances in Cryptology --- CRYPTO '97, volume 1296 of LNCS, pages 410--424. Springer Verlag, 1997.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_3_2_1_17_1","first-page":"199","volume-title":"Advances in Cryptology --- Proceedings of CRYPTO '82","author":"Chaum D.","year":"1983","unstructured":"D. Chaum . Blind signatures for untraceable payments . In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology --- Proceedings of CRYPTO '82 , pages 199 -- 203 . Plenum Press , 1983 .]] D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology --- Proceedings of CRYPTO '82, pages 199--203. Plenum Press, 1983.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_19_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46877-3_41","volume-title":"Advances in Cryptology --- EUROCRYPT '90","author":"Chaum D.","year":"1991","unstructured":"D. Chaum . Zero-knowledge undeniable signatures . In I. B. Damgard, editor, Advances in Cryptology --- EUROCRYPT '90 , volume 473 of LNCS , pages 458 -- 464 . Springer-Verlag , 1991 .]] D. Chaum. Zero-knowledge undeniable signatures. In I. B. Damgard, editor, Advances in Cryptology --- EUROCRYPT '90, volume 473 of LNCS, pages 458--464. Springer-Verlag, 1991.]]"},{"key":"e_1_3_2_1_20_1","series-title":"LNCS","first-page":"127","volume-title":"Advances in Cryptology ---EUROCRYPT '87","author":"Chaum D.","year":"1988","unstructured":"D. Chaum , J.-H. Evertse , and J. van de Graaf . An improved protocol for demonstrating possession of discrete logarithms and some generalizations . In D. Chaum and W. L. Price, editors, Advances in Cryptology ---EUROCRYPT '87 , volume 304 of LNCS , pages 127 -- 141 . Springer-Verlag , 1988 .]] D. Chaum, J.-H. Evertse, and J. van de Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In D. Chaum and W. L. Price, editors, Advances in Cryptology ---EUROCRYPT '87, volume 304 of LNCS, pages 127--141. Springer-Verlag, 1988.]]"},{"key":"e_1_3_2_1_21_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology --- CRYPTO'92","author":"Chaum D.","year":"1993","unstructured":"D. Chaum and T. P. Pedersen . Wallet databases with observers . In E. F. Brickell, editor, Advances in Cryptology --- CRYPTO'92 , volume 740 of LNCS , pages 89 -- 105 . Springer-Verlag , 1993 .]] D. Chaum and T. P. Pedersen. Wallet databases with observers. In E. F. Brickell, editor, Advances in Cryptology --- CRYPTO'92, volume 740 of LNCS, pages 89--105. Springer-Verlag, 1993.]]"},{"key":"e_1_3_2_1_22_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology --- EUROCRYPT '91","author":"Chaum D.","year":"1991","unstructured":"D. Chaum and E. van Heyst . Group signatures . In D. W. Davies, editor, Advances in Cryptology --- EUROCRYPT '91 , volume 547 of LNCS , pages 257 -- 265 . Springer-Verlag , 1991 .]] D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology --- EUROCRYPT '91, volume 547 of LNCS, pages 257--265. Springer-Verlag, 1991.]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357847"},{"key":"e_1_3_2_1_24_1","series-title":"LNCS","first-page":"152","volume-title":"Advances in Cryptology --- EUROCRYPT","author":"Damg\u00e5rd I.","year":"2001","unstructured":"I. Damg\u00e5rd and M. Koprowski . Practical threshold RSA signatures without a trusted dealer . In B. Pfitzmann, editor, Advances in Cryptology --- EUROCRYPT 2001 , volume 2045 of LNCS , pages 152 -- 165 . Springer Verlag , 2001.]] I. Damg\u00e5rd and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In B. Pfitzmann, editor, Advances in Cryptology --- EUROCRYPT 2001, volume 2045 of LNCS, pages 152--165. Springer Verlag, 2001.]]"},{"key":"e_1_3_2_1_25_1","series-title":"LNCS","first-page":"186","volume-title":"Advances in Cryptology --- CRYPTO '86","author":"Fiat A.","year":"1987","unstructured":"A. Fiat and A. Shamir . How to prove yourself: Practical solutions to identification and signature problems . In A. M. Odlyzko, editor, Advances in Cryptology --- CRYPTO '86 , volume 263 of LNCS , pages 186 -- 194 . Springer Verlag , 1987 .]] A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Advances in Cryptology --- CRYPTO '86, volume 263 of LNCS, pages 186--194. Springer Verlag, 1987.]]"},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"Advances in Cryptology --- CRYPTO '97","author":"Fujisaki E.","year":"1997","unstructured":"E. Fujisaki and T. Okamoto . Statistical zero knowledge protocols to prove modular polynomial relations . In B. Kaliski, editor, Advances in Cryptology --- CRYPTO '97 , volume 1294 of LNCS , pages 16 -- 30 . Springer Verlag , 1997 .]] E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In B. Kaliski, editor, Advances in Cryptology --- CRYPTO '97, volume 1294 of LNCS, pages 16--30. Springer Verlag, 1997.]]"},{"key":"e_1_3_2_1_27_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-48910-X_9","volume-title":"Advances in Cryptology --- EUROCRYPT '99","author":"Gennaro R.","year":"1999","unstructured":"R. Gennaro , S. Halevi , and T. Rabin . Secure hash-and-sign signatures without the random oracle . In J. Stern, editor, Advances in Cryptology --- EUROCRYPT '99 , volume 1592 of LNCS , pages 123 -- 139 . Springer Verlag , 1999 .]] R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. In J. Stern, editor, Advances in Cryptology --- EUROCRYPT '99, volume 1592 of LNCS, pages 123--139. Springer Verlag, 1999.]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_29_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/BFb0055727","volume-title":"Advances in Cryptology --- CRYPTO '98","author":"Kilian J.","year":"1998","unstructured":"J. Kilian and E. Petrank . Identity escrow . In H. Krawczyk, editor, Advances in Cryptology --- CRYPTO '98 , volume 1642 of LNCS , pages 169 -- 185 , Berlin, 1998 . Springer Verlag .]] J. Kilian and E. Petrank. Identity escrow. In H. Krawczyk, editor, Advances in Cryptology --- CRYPTO '98, volume 1642 of LNCS, pages 169--185, Berlin, 1998. Springer Verlag.]]"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"key":"e_1_3_2_1_31_1","volume-title":"Massachusetts Institute of Technology","author":"Lysyanskaya A.","year":"2002","unstructured":"A. Lysyanskaya . Signature schemes and applications to cryptographic protocol design. PhD thesis , Massachusetts Institute of Technology , Cambridge, Massachusetts , Sept. 2002 .]] A. Lysyanskaya. Signature schemes and applications to cryptographic protocol design. PhD thesis, Massachusetts Institute of Technology, Cambridge, Massachusetts, Sept. 2002.]]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352639"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884436"},{"key":"e_1_3_2_1_34_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology --- EUROCRYPT '96","author":"Pointcheval D.","year":"1996","unstructured":"D. Pointcheval and J. Stern . Security proofs for signature schemes . In U. Maurer, editor, Advances in Cryptology --- EUROCRYPT '96 , volume 1070 of LNCS , pages 387 -- 398 . Springer Verlag , 1996 .]] D. Pointcheval and J. Stern. Security proofs for signature schemes. In U. Maurer, editor, Advances in Cryptology --- EUROCRYPT '96, volume 1070 of LNCS, pages 387--398. Springer Verlag, 1996.]]"},{"key":"e_1_3_2_1_35_1","volume-title":"Version 1.1b,","author":"Trusted Computing Group","year":"2001","unstructured":"Trusted Computing Group . Trusted computing platform alliance (TCPA) main specification, version 1.1a. Republished as Trusted Computing Group (TCG) main specifcation , Version 1.1b, Available at www.trustedcomputinggroup.org, 2001 .]] Trusted Computing Group. Trusted computing platform alliance (TCPA) main specification, version 1.1a. Republished as Trusted Computing Group (TCG) main specifcation, Version 1.1b, Available at www.trustedcomputinggroup.org, 2001.]]"},{"key":"e_1_3_2_1_36_1","volume-title":"TCG TPM specification 1.2.","author":"Trusted Computing Group","year":"2003","unstructured":"Trusted Computing Group . TCG TPM specification 1.2. Available at www.trustedcomputinggroup.org, 2003 .]] Trusted Computing Group. TCG TPM specification 1.2. Available at www.trustedcomputinggroup.org, 2003.]]"},{"key":"e_1_3_2_1_37_1","unstructured":"Trusted Computing Group website. www.trustedcomputinggroup.org.]]  Trusted Computing Group website. www.trustedcomputinggroup.org.]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":36,"alternative-id":["10.1145\/1030083.1030103","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030103","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}