Entry Au:2011:PPT from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Au:2011:PPT,
author = "M. Ho Au and P. P. Tsang and A. Kapadia",
title = "{PEREA}: Practical {TTP}-free revocation of repeatedly
misbehaving anonymous users",
journal = j-TISSEC,
volume = "14",
number = "4",
pages = "29:1--29:??",
month = dec,
year = "2011",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2043628.2043630",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Dec 22 18:15:07 MST 2011",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Several anonymous authentication schemes allow servers
to revoke a misbehaving user's ability to make future
accesses. Traditionally, these schemes have relied on
powerful Trusted Third Parties (TTPs) capable of
deanonymizing (or linking) users' connections. Such
TTPs are undesirable because users' anonymity is not
guaranteed, and users must trust them to judge
misbehaviors fairly. Recent schemes such as
Blacklistable Anonymous Credentials (BLAC) and Enhanced
Privacy ID (EPID) support ``privacy-enhanced
revocation''--- servers can revoke misbehaving users
without a TTP's involvement, and without learning the
revoked users' identities. In BLAC and EPID, however,
the computation required for authentication at the
server is linear in the size (L) of the revocation
list, which is impractical as the size approaches
thousands of entries.",
acknowledgement = ack-nhfb,
articleno = "29",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- ability,
2(2)159,
10(1)4,
13(4)39,
14(1)9,
14(1)10,
15(4)15,
18(2)8
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(1)2,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(2)5,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
- anonymity,
1(1)66,
2(3)230,
2(4)354,
2(4)390,
11(2)3,
11(2)6,
12(3)15,
13(2)13,
13(4)29,
13(4)39,
13(4)41,
14(1)4,
15(1)5,
15(3)11,
15(3)12,
15(3)14,
17(1)4
- anonymous,
3(2)63,
7(4)489,
11(2)3,
12(3)15,
12(4)21,
13(1)8,
13(4)39,
13(4)41,
14(1)4,
14(1)10,
15(1)4,
15(1)5,
15(3)14,
17(1)4,
17(3)10,
17(3)12
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(2)7,
18(3)11
- authentication,
1(1)3,
2(2)138,
2(2)159,
2(2)177,
2(3)230,
2(3)332,
2(4)354,
2(4)390,
5(4)367,
5(4)458,
6(2)258,
10(3)10,
10(3)11,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(4)21,
13(2)17,
13(4)32,
14(1)5,
14(1)11,
16(2)6,
16(2)8,
16(4)15,
17(2)6,
17(4)14,
18(1)1,
18(3)11,
18(4)14
- because,
1(1)66,
2(3)269,
10(4)5,
11(4)18,
11(4)21,
12(1)2,
12(2)10,
14(1)3,
16(2)7,
17(1)1,
17(1)4,
17(3)10
- BLAC,
13(4)39
- capable,
12(2)11,
17(2)7,
17(4)14
- computation,
1(1)26,
2(3)332,
9(4)461,
11(2)6,
12(1)6,
13(3)22,
13(4)29,
14(1)5,
14(4)31,
15(1)2,
15(2)9,
16(3)11,
17(3)11
- connection,
2(3)269,
16(4)13
- credential,
6(1)1,
10(3)12,
11(1)2,
12(1)6,
12(2)8,
12(3)15,
13(1)2,
13(4)39,
14(1)8,
14(1)10,
15(1)4,
17(3)10
- enhanced,
2(1)34,
10(1)2,
11(4)22,
14(3)24,
15(2)7
- entry,
2(2)159,
15(2)9
- fairly,
12(3)14,
17(3)10
- future,
13(1)10,
17(3)10
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- however,
2(3)269,
10(2)5,
10(2)8,
11(2)6,
11(3)15,
11(4)18,
11(4)20,
11(4)22,
13(3)20,
13(3)22,
13(4)35,
13(4)38,
13(4)39,
14(1)14,
14(3)24,
14(4)28,
15(2)10,
16(2)7,
16(3)11,
17(1)2,
17(1)4,
17(3)12,
17(4)15,
18(1)1,
18(2)7,
18(4)13
- ID,
15(4)16
- identity,
2(2)177,
2(4)390,
10(3)9,
11(2)6,
12(3)15,
13(4)36,
13(4)41,
14(1)10,
14(3)25,
15(1)4,
15(3)12,
17(1)4
- impractical,
13(3)26,
17(1)2
- learning,
2(3)295,
12(3)16,
13(1)10,
14(1)10,
14(2)21
- linear,
11(2)1,
11(3)13,
11(4)21,
12(3)16,
12(3)18,
12(4)20,
15(1)4,
16(4)17,
17(3)11,
18(2)5,
18(2)7
- linking,
13(4)39
- list,
13(4)31
- make,
2(3)332,
9(1)31,
10(1)2,
10(3)11,
10(4)6,
11(1)4,
11(3)13,
11(3)14,
11(4)22,
11(4)23,
12(1)1,
12(3)15,
13(3)22,
13(3)26,
13(3)28,
13(4)35,
15(1)3,
15(1)4,
15(4)17,
16(3)10,
17(3)10,
18(1)1,
18(2)7,
18(4)13
- misbehaving,
13(4)39,
17(1)4
- misbehavior,
11(4)19,
13(4)39,
17(1)4,
17(4)15,
18(1)2
- must,
2(2)159,
2(2)177,
9(4)421,
10(3)12,
10(4)4,
11(3)13,
13(4)40,
15(2)10,
16(1)4,
17(2)6
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- party,
9(4)421,
10(2)8,
10(4)3,
11(2)4,
11(2)6,
12(1)6,
12(2)12,
13(3)22,
13(4)39,
15(2)9,
17(3)9
- powerful,
1(1)93,
12(2)12,
15(2)8,
17(3)9
- practical,
2(4)390,
4(2)158,
7(2)319,
9(3)325,
10(2)6,
10(4)1,
11(2)1,
11(2)5,
11(4)18,
12(3)19,
14(1)7,
14(1)14,
14(2)20,
15(1)4,
15(2)6,
15(2)7,
15(4)16,
16(3)10,
16(3)12,
16(4)13,
17(4)16,
18(1)3,
18(4)13
- privacy,
1(1)66,
2(4)390,
7(2)319,
10(3)12,
11(2)3,
11(2)6,
11(3)16,
12(1)6,
12(2)8,
12(2)9,
12(3)16,
12(4)21,
13(1)7,
13(2)16,
13(3)22,
13(3)24,
13(4)39,
14(1)4,
14(3)26,
14(4)30,
14(4)31,
15(2)7,
15(3)12,
16(3)11,
16(3)12,
17(1)3,
17(3)10,
18(1)2,
18(4)12
- recent,
2(1)65,
2(2)138,
10(2)8,
10(3)9,
11(1)2,
11(4)22,
12(1)2,
12(2)12,
14(1)7,
14(1)14,
15(1)3,
16(2)7,
16(3)10,
18(1)1,
18(2)5,
18(2)7,
18(4)13
- relied,
11(2)4
- repeatedly,
13(4)39
- required,
7(2)319,
10(2)5,
11(2)3,
11(3)15,
11(3)16,
12(1)6,
12(2)8,
12(3)16,
13(3)22,
13(4)29,
16(4)15,
17(3)10,
17(4)16,
18(3)11
- revocation,
6(3)404,
9(3)325,
9(4)461,
11(3)14,
12(3)18
- revoke,
9(4)461,
11(3)14,
13(4)39
- schemes,
3(3)161,
9(1)1,
9(4)461,
10(4)4,
10(4)5,
11(2)1,
11(2)4,
11(2)5,
11(3)15,
11(4)22,
12(1)2,
12(1)3,
12(2)8,
12(3)18,
13(3)25,
13(4)39,
14(1)14,
15(2)9,
17(1)4,
17(2)6,
17(4)15,
18(3)10
- server,
1(1)66,
2(1)34,
2(3)230,
2(4)390,
10(4)4,
11(2)2,
11(2)5,
11(3)14,
12(2)10,
12(3)14,
12(3)16,
12(3)17,
12(4)21,
14(1)3,
14(1)12,
16(4)13,
16(4)15,
17(2)5,
17(4)15,
18(1)1
- several,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)295,
10(1)2,
10(1)4,
10(2)6,
10(2)7,
10(3)12,
10(4)6,
11(1)4,
11(2)4,
11(4)17,
12(2)8,
12(4)20,
13(3)27,
13(4)30,
13(4)39,
13(4)41,
14(3)27,
14(4)31,
15(2)6,
15(2)10,
16(3)12,
17(1)4,
17(3)9,
17(3)10,
18(1)1
- size,
2(3)295,
10(3)11,
10(4)5,
11(2)6,
11(3)13,
11(4)18,
12(3)16,
12(4)20,
14(1)3,
17(4)15,
18(1)4,
18(4)12
- support,
2(2)159,
5(4)492,
6(4)443,
6(4)547,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)12,
10(4)5,
11(1)3,
11(2)5,
12(1)3,
12(3)14,
12(3)15,
12(4)21,
13(3)24,
13(4)31,
14(1)3,
14(1)11,
14(1)12,
15(2)9,
15(3)13,
17(2)5,
17(2)7,
17(4)15,
18(2)8,
18(3)11
- third,
9(2)181,
11(2)3,
11(2)4,
11(2)6,
12(2)12,
13(4)31,
13(4)39,
15(2)9
- thousand,
2(1)65,
10(1)4,
15(4)18,
18(2)7
- traditionally,
14(1)4,
16(2)8
- trust,
5(2)95,
6(1)1,
7(1)21,
7(3)428,
9(3)352,
9(4)391,
10(3)11,
10(3)12,
10(4)3,
10(4)4,
11(1)2,
12(1)2,
12(1)6,
12(2)8,
13(1)2,
13(1)5,
13(2)16,
17(2)6
- trusted,
2(2)138,
2(3)269,
8(2)153,
10(4)3,
11(2)6,
11(3)14,
12(1)3,
13(4)39,
14(1)8,
14(3)27,
15(2)9,
16(2)5,
16(2)7,
16(4)15,
17(2)6,
18(2)8
- TTP,
13(4)39
- TTPs,
13(4)39
- undesirable,
10(1)3