{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:22:14Z","timestamp":1778127734506,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314337","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"21-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":96,"title":["Enhanced privacy id"],"prefix":"10.1145","author":[{"given":"Ernie","family":"Brickell","sequence":"first","affiliation":[{"name":"Intel Corporation, Hillsboro, OR"}]},{"given":"Jiangtao","family":"Li","sequence":"additional","affiliation":[{"name":"Intel Corporation, Hillsboro, OR"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf00","author":"Ateniese G.","year":"2000","unstructured":"G. Ateniese , J. Camenisch , M. Joye , and G. Tsudik . A practical and provably secure coalition-resistant group signature scheme . In Advances in Cryptology \u00bf CRYPTO \u00bf00 , volume 1880 of LNCS , pages 255 -\u00bf 270 . Springer , 2000 . G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology \u00bf CRYPTO \u00bf00, volume 1880 of LNCS, pages 255-\u00bf270. Springer, 2000."},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","first-page":"183","volume-title":"Proceedings of the 6th International Conference on Financial Cryptography","author":"Ateniese G.","year":"2002","unstructured":"G. Ateniese , D. X. Song , and G. Tsudik . Quasi-efficient revocation in group signatures . In Proceedings of the 6th International Conference on Financial Cryptography , volume 2357 of LNCS , pages 183 -\u00bf 197 . Springer , 2002 . G. Ateniese, D. X. Song, and G. Tsudik. Quasi-efficient revocation in group signatures. In Proceedings of the 6th International Conference on Financial Cryptography, volume 2357 of LNCS, pages 183-\u00bf197. Springer, 2002."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology \u00bf EUROCRYPT \u00bf98","author":"Bellare M.","year":"1998","unstructured":"M. Bellare , J. A. Garay , and T. Rabin . Fast batch verification for modular exponentiation and digital signatures . In Advances in Cryptology \u00bf EUROCRYPT \u00bf98 , volume 1403 of LNCS , pages 236 -\u00bf 250 . Springer , 1998 . M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In Advances in Cryptology \u00bf EUROCRYPT \u00bf98, volume 1403 of LNCS, pages 236-\u00bf250. Springer, 1998."},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","first-page":"55","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf04","author":"Boneh D.","unstructured":"D. Boneh , X. Boyen , and H. Shacham . Short group signatures . In Advances in Cryptology \u00bf CRYPTO \u00bf04 , volume 3152 of LNCS , pages 41\u00bf- 55 . Springer, 2004. 29 D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Advances in Cryptology \u00bf CRYPTO \u00bf04, volume 3152 of LNCS, pages 41\u00bf-55. Springer, 2004. 29"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/517876"},{"key":"e_1_3_2_1_7_1","first-page":"190","volume-title":"Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography","author":"Bresson E.","year":"2001","unstructured":"E. Bresson and J. Stern . Efficient revocation in group signatures . In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography , pages 190 -\u00bf 206 . Springer , 2001 . E. Bresson and J. Stern. Efficient revocation in group signatures. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, pages 190-\u00bf206. Springer, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","first-page":"156","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf87","author":"Brickell E. F.","year":"1987","unstructured":"E. F. Brickell , D. Chaum , I. Damg\u00e5rd , and J. van de Graaf . Gradual and verifiable release of a secret . In Advances in Cryptology \u00bf CRYPTO \u00bf87 , volume 293 of LNCS , pages 156 -\u00bf 166 . Springer , 1987 . E. F. Brickell, D. Chaum, I. Damg\u00e5rd, and J. van de Graaf. Gradual and verifiable release of a secret. In Advances in Cryptology \u00bf CRYPTO \u00bf87, volume 293 of LNCS, pages 156-\u00bf166. Springer, 1987."},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"93","volume-title":"Advances in Cryptology \u00bf EUROCRYPT \u00bf01","author":"Camenisch J.","year":"2001","unstructured":"J. Camenisch and A. Lysyanskaya . An efficient system for non-transferable anonymous credentials with optional anonymity revocation . In Advances in Cryptology \u00bf EUROCRYPT \u00bf01 , volume 2045 of LNCS , pages 93 -\u00bf 118 . Springer , 2001 . J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology \u00bf EUROCRYPT \u00bf01, volume 2045 of LNCS, pages 93-\u00bf118. Springer, 2001."},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"61","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf02","author":"Camenisch J.","year":"2002","unstructured":"J. Camenisch and A. Lysyanskaya . Dynamic accumulators and application to efficient revocation of anonymous credentials . In Advances in Cryptology \u00bf CRYPTO \u00bf02 , volume 2442 of LNCS , pages 61 -\u00bf 76 . Springer , 2002 . J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology \u00bf CRYPTO \u00bf02, volume 2442 of LNCS, pages 61-\u00bf76. Springer, 2002."},{"key":"e_1_3_2_1_13_1","first-page":"289","volume-title":"Proceedings of the 3rd Conference on Security in Communication Networks","volume":"2576","author":"Camenisch J.","unstructured":"J. Camenisch and A. Lysyanskaya . A signature scheme with efficient protocols . In Proceedings of the 3rd Conference on Security in Communication Networks , volume 2576 of LNCS, pages 268\u00bf- 289 . Springer, 2002. J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In Proceedings of the 3rd Conference on Security in Communication Networks, volume 2576 of LNCS, pages 268\u00bf-289. Springer, 2002."},{"key":"e_1_3_2_1_14_1","series-title":"LNCS","first-page":"106","volume-title":"Advances in Cryptology \u00bf EUROCRYPT \u00bf99","author":"Camenisch J.","year":"1999","unstructured":"J. Camenisch and M. Michels . Proving in zero-knowledge that a number is the product of two safe primes . In In Advances in Cryptology \u00bf EUROCRYPT \u00bf99 , volume 1592 of LNCS , pages 106 -\u00bf 121 . Springer , 1999 . J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In In Advances in Cryptology \u00bf EUROCRYPT \u00bf99, volume 1592 of LNCS, pages 106-\u00bf121. Springer, 1999."},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/3-540-48405-1_27","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf99","author":"Camenisch J.","year":"1999","unstructured":"J. Camenisch and M. Michels . Separability and efficiency for generic group signature schemes . In In Advances in Cryptology \u00bf CRYPTO \u00bf99 , volume 1666 of LNCS , pages 413 -\u00bf 430 . Springer , 1999 . J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In In Advances in Cryptology \u00bf CRYPTO \u00bf99, volume 1666 of LNCS, pages 413-\u00bf430. Springer, 1999."},{"key":"e_1_3_2_1_16_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf97","author":"Camenisch J.","year":"1997","unstructured":"J. Camenisch and M. Stadler . Efficient group signature schemes for large groups . In Advances in Cryptology \u00bf CRYPTO \u00bf97 , volume 1296 of LNCS , pages 410 -\u00bf 424 . Springer , 1997 . J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In Advances in Cryptology \u00bf CRYPTO \u00bf97, volume 1296 of LNCS, pages 410-\u00bf424. Springer, 1997."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_20_1","series-title":"LNCS","first-page":"464","volume-title":"Advances in Cryptology \u00bf EUROCRYPT \u00bf90","author":"Chaum D.","unstructured":"D. Chaum . Zero-knowledge undeniable signatures . In Advances in Cryptology \u00bf EUROCRYPT \u00bf90 , volume 473 of LNCS , pages 458\u00bf- 464 . Springer, 1990. D. Chaum. Zero-knowledge undeniable signatures. In Advances in Cryptology \u00bf EUROCRYPT \u00bf90, volume 473 of LNCS, pages 458\u00bf-464. Springer, 1990."},{"key":"e_1_3_2_1_21_1","series-title":"LNCS","first-page":"141","volume-title":"Advances in Cryptology \u00bf EUROCRYPT \u00bf87","author":"Chaum D.","unstructured":"D. Chaum , J.-H. Evertse , and J. van de Graaf . An improved protocol for demonstrating possession of discrete logarithms and some generalizations . In Advances in Cryptology \u00bf EUROCRYPT \u00bf87 , volume 304 of LNCS , pages 127\u00bf- 141 . Springer, 1987. D. Chaum, J.-H. Evertse, and J. van de Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In Advances in Cryptology \u00bf EUROCRYPT \u00bf87, volume 304 of LNCS, pages 127\u00bf-141. Springer, 1987."},{"key":"e_1_3_2_1_22_1","series-title":"LNCS","first-page":"105","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf92","author":"Chaum D.","unstructured":"D. Chaum and T. P. Pedersen . Wallet databases with observers . In Advances in Cryptology \u00bf CRYPTO \u00bf92 , volume 740 of LNCS , pages 89\u00bf- 105 . Springer, 1992. D. Chaum and T. P. Pedersen. Wallet databases with observers. In Advances in Cryptology \u00bf CRYPTO \u00bf92, volume 740 of LNCS, pages 89\u00bf-105. Springer, 1992."},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","first-page":"265","volume-title":"Advances in Cryptology \u00bf EUROCRYPT \u00bf91","author":"Chaum D.","unstructured":"D. Chaum and E. van Heyst . Group signatures . In Advances in Cryptology \u00bf EUROCRYPT \u00bf91 , volume 547 of LNCS , pages 257\u00bf- 265 . Springer, 1991. D. Chaum and E. van Heyst. Group signatures. In Advances in Cryptology \u00bf EUROCRYPT \u00bf91, volume 547 of LNCS, pages 257\u00bf-265. Springer, 1991."},{"key":"e_1_3_2_1_24_1","series-title":"LNCS","first-page":"125","volume-title":"Advances in Cryptology \u00bf ASIACRYPT \u00bf02","author":"Damg\u00e5rd I.","year":"2002","unstructured":"I. Damg\u00e5rd and E. Fujisaki . An integer commitment scheme based on groups with hidden order . In Advances in Cryptology \u00bf ASIACRYPT \u00bf02 , volume 2501 of LNCS , pages 125 -\u00bf 142 . Springer , Dec. 2002 . I. Damg\u00e5rd and E. Fujisaki. An integer commitment scheme based on groups with hidden order. In Advances in Cryptology \u00bf ASIACRYPT \u00bf02, volume 2501 of LNCS, pages 125-\u00bf142. Springer, Dec. 2002."},{"key":"e_1_3_2_1_25_1","series-title":"LNCS","first-page":"194","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf86","author":"Fiat A.","unstructured":"A. Fiat and A. Shamir . How to prove yourself: Practical solutions to identification and signature problems . In Advances in Cryptology \u00bf CRYPTO \u00bf86 , volume 263 of LNCS , pages 186\u00bf- 194 . Springer, 1987. A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology \u00bf CRYPTO \u00bf86, volume 263 of LNCS, pages 186\u00bf-194. Springer, 1987."},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"30","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf97","author":"Fujisaki E.","unstructured":"E. Fujisaki and T. Okamoto . Statistical zero knowledge protocols to prove modular polynomial relations . In Advances in Cryptology \u00bf CRYPTO \u00bf97 , volume 1294 of LNCS , pages 16\u00bf- 30 . Springer, 1997. E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology \u00bf CRYPTO \u00bf97, volume 1294 of LNCS, pages 16\u00bf-30. Springer, 1997."},{"key":"e_1_3_2_1_27_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/BFb0055727","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf98","author":"Kilian J.","year":"1998","unstructured":"J. Kilian and E. Petrank . Identity escrow . In Advances in Cryptology \u00bf CRYPTO \u00bf98 , volume 1642 of LNCS , pages 169 -\u00bf 185 . Springer , 1998 . J. Kilian and E. Petrank. Identity escrow. In Advances in Cryptology \u00bf CRYPTO \u00bf98, volume 1642 of LNCS, pages 169-\u00bf185. Springer, 1998."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352639"},{"key":"e_1_3_2_1_30_1","first-page":"184","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Pfitzmann B.","year":"2001","unstructured":"B. Pfitzmann and M. Waidner . A model for asynchronous reactive systems and its application to secure message transmission . In Proceedings of the IEEE Symposium on Security and Privacy , pages 184 -\u00bf 200 . IEEE Computer Society Press , 2001 . B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proceedings of the IEEE Symposium on Security and Privacy, pages 184-\u00bf200. IEEE Computer Society Press, 2001."},{"key":"e_1_3_2_1_31_1","series-title":"LNCS","first-page":"398","volume-title":"Advances in Cryptology \u00bf EUROCRYPT \u00bf96","author":"Pointcheval D.","unstructured":"D. Pointcheval and J. Stern . Security proofs for signature schemes . In Advances in Cryptology \u00bf EUROCRYPT \u00bf96 , volume 1070 of LNCS , pages 387\u00bf- 398 . Springer, 1996 D. Pointcheval and J. Stern. Security proofs for signature schemes. In Advances in Cryptology \u00bf EUROCRYPT \u00bf96, volume 1070 of LNCS, pages 387\u00bf-398. Springer, 1996"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502015"},{"key":"e_1_3_2_1_34_1","volume-title":"TCG TPM specification 1.2","author":"Trusted Computing Group","year":"2003","unstructured":"Trusted Computing Group . TCG TPM specification 1.2 , 2003 . Available at http:\/\/www.trustedcomputinggroup.org. Trusted Computing Group. TCG TPM specification 1.2, 2003. Available at http:\/\/www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_35_1","unstructured":"Trusted Computing Group website. http:\/\/www.trustedcomputinggroup.org.  Trusted Computing Group website. http:\/\/www.trustedcomputinggroup.org."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Alexandria Virginia USA","acronym":"CCS07","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314337"}},"subtitle":["a direct anonymous attestation scheme with enhanced revocation capabilities"],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":33,"alternative-id":["10.1145\/1314333.1314337","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314337","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}