參考文獻 |
[1] G. Ateniese, G. Tsudik, and D. Song, "Quasi-Efficient Revocation of Group
Signatures," Proc. of Financial Cryptography′02, LNCS Vol.2357, pp.183-197, 2003.
[2] M. Backes, M. Maffei, and D. Nruh, "Zero-knowledge in the Applied Pi-calculus
and Automated Verification of the Direct Anonymous Attestation Protocol," Proc. of IEEE Symposiumon Security and Privacy, IEEE Computer Society, pp. 202-215, 2008.
[3] D. Boneh and X. Boyen, "Short Signatures without Random Oracles," Proc.of EUROCRYPT′04, LNCS Vol.3027, pp.56-73, 2004.
[4] D. Boneh and H. Shacham, "Group Signatures with Verifier-Local Revocation,"Proc. of the 11th ACM conferenceon Computer and Communications Security- CCS′04, pp.168-177, 2004.
[5] D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures," Proc.of CRYPTO′04, LNCS Vol.3152, pp.41-55,2004.
[6] P.S.L.M. Barreto and M. Naehrig, "Pairing-Friendly Elliptic Curves of Prime Order," Selected Areas in Cryptography - SAC′05, LNCS Vol.3897, pp.319-331, 2006.
[7] E. Brickell, "An Efficient Protocol for Anonymously Providing Assurance of the Container of a Private Key," Submitted to the Trusted Computing Group, 2003.
[8] E. Brickell, J. Camenisch,and L. Chen, "Direct Anonymous Attestation," Proc. of the 11th ACM Conference on Computer and Communications Security - CCS′04, pp.132-145, 2004.
[9] E. Brickell, and J. Li, "Enhanced Privacy ID from Bilinear Pairing," Cryptology ePrint Archive, 2009, 95,
http://eprint.iacr.org/.
[10] E. Brickell, L. Chen, and J. Li, "A New Direct Anonymous Attestation Scheme
from Bilinear Maps," Proc. of 1st International Conferenceon Trusted Computing and Trust in Information
Technologies -Trust′08, LNCS Vol.4968, pp. 166-178, 2008.
[11] E. Brickell and J. Li, "Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities," Proc. of the 6th ACM Workshop on Privacy in the Electronic Society -WPES′07, pp.21-30,2007.
[12] E. Brickell, L. Chen, and J. Li, "Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings," International Journal of Information Security, Vol.8, No.5, pp.315-330, 2009.
[13] D. Chaum and E. VanHeyst, "GroupSignatures," Advance in Cryptography- EUROCRYPT′91, LNCS Vol.547, pp.257-265,
1991.
[14] J. Camenisch and A. Lysyanskaya, "Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials", Proc. of CRYPTO′02, LNCS Vol.2442, pp.61-76, 2002.
[15] J. Camenisch and A. Lysyanskaya, "Signature Schemes and Anonymous Credentials from Bilinear Maps," Proc. of
CRYPTO′04, LNCS Vol.3152, pp.56-72, 2004.
[16] X. Chen and D. Feng, "Direct Anonymous Attestation for Next Generation TPM," Journal of Computers, Vol.3, No.12, pp.43-50, 2008.
[17] L. Chen, D. Page, and N.P. Smart, "On the Design and Implementation of An Efficient DAA Scheme," Proc. of the
9th Smart Card Research and Advanced Application IFIP Conference, LNCS Vol.6035, pp.223-237, 2010.
[18] L. Chen, P. Morrissey, and N.P.Smart, "Pairings in Trusted Computing," Galbraith, S.D., Paterson,K.G. (eds.)-Pairing′08, LNCS Vol.5209, pp.1-17, 2008.
[19] L. Chen, P. Morrissey, and N.P. Smart, "Fixing the Pairing Based Protocols," Cryptology ePrint Archive, 2008, 198, http://eprint.iacr.org/.
[20] L. Chen, "A DAA Scheme Requiring Less TPM Resource," Proc. of the 5th China International Conference on Information Security and Cryptology, LNCS Vol.6151, pp.350-365, 2010.
[21] A. Fiat and A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems," Proc. of CRYPTO′86, LNCS Vol.263, pp.186-194, 1987.
[22] FIPS 180-1, "Secure Hash Standard,"NIST, US Department of Commerce, Washington, D.C., 1995.
[23] G. Frey, M. Muller, and H.Ruck, "The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve
Cryptosystems," IEEE Transactions on Information Theory, Vol.45, No.5, pp.1717-1718, 1999.
[24] H. Ge and S.R. Tate, "A Direct Anonymous Attestation Scheme for Embedded Devices," Proc of Public Key
Cryptography -PKC′07, LNCS Vol.4450, pp.16-30, 2007.
[25] A. Lysyanskaya, R.L. Rivest, A. Sahai, and S. Wolf, "Pseudonym Systems," Heys, H.M., Adams, C.M.(eds.) -
SAC′99, LNCS Vol.1758, pp.184-199, 2000.
[26] A. Martin, "The Ten-page Introduction to Trusted Computing," TechnicalReport RR-08-11, OUCL, 2008.
[27] M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated Verifiers Proofs and Their Applications," Advance in Cryptography -EUROCRYPT′96, LNCS Vol.1070, pp.143-154, 1996.
[28] V. Miller, "The Weil Pairing, and Its Efficient Calculation," Journal of Cryptology, Vol.17, No.4, pp.235-261, 2004.
[29] B. Paron, "The Trusted Platform Module(TPM) and Sealed Storage," Technical Report, 2007.
[30] M. Ryan, "Introduction to the TPM1.2," Draft, 2009.
[31] R. Rivest, L. Shamir, Y. Tauman, "How to Leak A Secret" Advance in Cryptography -ASIACRYPT′01, LNCS Vol.2248, pp.552-565, 2001.
[32] G. Tsudik and S. Xu, "Accumulating Composites and improved Group Signing," Proc. of Asiacrypt′03, LNCS
Vol.2894, pp.269-286, 2003.
[33] Trusted Computing Group, "TCG Specification Architecture Overview," Trusted computing platform alliance(TCPA) main specification, version1.1a, 2001.
[34] Trusted Computing Group, "TCG Specification Architecture Overview," TCG Specification Revision1.4, 2007.
[35] Trusted Computing Group, "Trusted Platform Module Library Part1: Architecture," Revision 00.96, March 2013. |