과제정보
연구 과제 주관 기관 : 서일대학
참고문헌
- David Chaum, "Security Without Identification: Transaction Systems to Make Big Brother Obsolete," Communications of the ACM, Vol. 28, No. 10, 1985, pp. 1030-1044. https://doi.org/10.1145/4372.4373
- M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko, "The One-More-RSA-Inversion Problems and the Security of Chaun's Blind Signatures Signatures," Journal of Cryptology, June 2003, pp. 185-215.
- David Chaum, E. V. Heyst, "Group Signatures," Advanced in Cryptology-Eurocrypt 1991, LNCS 547, pp. 257-265.
- Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Tsudik, "A Pratical and Probably Secure Coalition-resistant Group Signature Scheme," CRYPTO 2000, 2000.
- G. Ateniese, G. Tsudik, and D. Song, "Quasiefficient Revocation of Group Signatures," Proc of Financial Cryptography 2002, Mar. 2002.
- M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of Group Signatures: Definition, Simplified Requirements and a Construction Based on General Assumptions," CRYPTO 2004, 2004.
- D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures," CRYPTO 2004, LNCS 3152, 2004, pp. 41-55.
- Dan Boneh and Hovav Shacham, "Group Signatures with Verifier-Local Revocation," CCS 2004, pp. 168-177.
- Ron Rivest, Adi Shamir, and Yael Tauman, "How to Leak a Secret: Theory and Applications of Ring Signatures," ASIACRYPT 2001, 2001.
- Aggelos Kiayaias, Yiannis Tsiounis, and Moti Yung, "Traceable Signatures," EUROCRYPT 2004, 2004.
- A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable Signatures,"Eurocrypt 2004, LNCS 3027, 2004, pp. 571-589.