\relax 
\citation{OhtaOK1990}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
\@writefile{toc}{\contentsline {section}{\numberline {2}Protocols for Individual Identification}{2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Overview}{2}}
\citation{FiatS1986}
\citation{FiatS1986}
\citation{DesmedtGB1987}
\citation{BethD1990}
\citation{OhtaO1988}
\citation{MicaliS1988:244}
\citation{GuillouQ1988}
\citation{BurmesterDPW1989}
\citation{OngS1990}
\citation{Naccache1992}
\citation{Okamoto1992}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}System initialization}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3}Registration with a CA}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4}Certificate issuing protocol}{5}}
\citation{RivestCRL1998}
\citation{RivestCRL1998}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.5}Certificate showing protocol}{7}}
\citation{RivestCRL1998}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.6}Generation of signed messages}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.7}Revocation of certificates}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.8}Efficiency analysis}{9}}
\citation{GPR1997}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.9}Possible improvements}{10}}
\@writefile{toc}{\contentsline {section}{\numberline {3}Key Management Protocols for the CA Tree}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Overview}{10}}
\citation{ChickT1989}
\citation{OhtaOK1990}
\@writefile{toc}{\contentsline {section}{\numberline {4}Protocols for Group Identification: Base System}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Overview}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}System initialization}{12}}
\citation{ChickT1989}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Group creation and destruction}{13}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Addition and removal of members}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}Daily key renewal}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Group membership certificate issuing protocol}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.7}Interactive proof of membership}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8}Efficiency analysis}{15}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.8.1}Storage requirements}{15}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.8.2}Computation requirements}{16}}
\@writefile{toc}{\contentsline {section}{\numberline {5}Protocols for Group Identification: Full System}{17}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Overview}{17}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Interactive proof of membership in the union of several groups}{17}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Converting the base system into the full system}{19}}
\@writefile{toc}{\contentsline {section}{\numberline {6}Protocols for Financial Transactions}{21}}
\bibstyle{alpha}
\bibdata{biblio}
\bibcite{BethD1990}{BD90}
\bibcite{BurmesterDPW1989}{BDPW89}
\bibcite{ChickT1989}{CT89}
\bibcite{EUROCRYPT90}{Dam90}
\bibcite{DesmedtGB1987}{DGB87}
\bibcite{FiatS1986}{FS86}
\bibcite{CRYPTO88}{Gol88}
\bibcite{GPR1997}{GPR97}
\bibcite{GuillouQ1988}{GQ88}
\bibcite{MicaliS1988:244}{MS88}
\citation{CRYPTO88}
\bibcite{Naccache1992}{Nac92}
\bibcite{Okamoto1992}{Oka92}
\bibcite{OhtaO1988}{OO88}
\citation{CRYPTO88}
\bibcite{OhtaOK1990}{OOK90}
\citation{EUROCRYPT90}
\bibcite{OngS1990}{OS90}
\citation{EUROCRYPT90}
\bibcite{RivestCRL1998}{Riv98}
