메뉴 건너뛰기




Volumn 243, Issue 1-2, 2000, Pages 363-389

Secure distributed storage and retrieval

Author keywords

Distributed storage; Information dispersal; Information security; Threshold cryptography

Indexed keywords


EID: 0012577752     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0304-3975(98)00263-1     Document Type: Article
Times cited : (57)

References (35)
  • 2
    • 0002181960 scopus 로고
    • Digital multisignatures
    • H. Baker, F. Piper (Eds.), Claredon Press, Oxford
    • C. Boyd, Digital multisignatures, in: H. Baker, F. Piper (Eds.), Cryptography and Coding, Claredon Press, Oxford, 1989, pp. 241-246.
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 3
    • 84984842401 scopus 로고
    • Maintaining security in the presence of transient faults
    • Y. Desmedt (Ed.), Advances in cryptography - Crypto '94, Springer, Berlin
    • R. Canetti, A. Herzberg, Maintaining security in the presence of transient faults, in: Y. Desmedt (Ed.), Advances in cryptography - Crypto '94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 1994, pp. 425-438.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 425-438
    • Canetti, R.1    Herzberg, A.2
  • 4
    • 0027580298 scopus 로고
    • Efficient and secure multiparty generation of digital signatures based on discrete logarithms
    • M. Cerecedo, T. Matsumoto, H. Imai, Efficient and secure multiparty generation of digital signatures based on discrete logarithms, IEICE Trans. Fundamentals E76-A (4) (1993) 532-545.
    • (1993) IEICE Trans. Fundamentals , vol.E76-A , Issue.4 , pp. 532-545
    • Cerecedo, M.1    Matsumoto, T.2    Imai, H.3
  • 5
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, R. Rivest and A. Sherman (eds.), Plenum, New York
    • D. Chaum, Blind signatures for untraceable payments, in: Advances in Cryptology - Crypto '82, in: D. Chaum, R. Rivest and A. Sherman (eds.), Plenum, New York, 1983. pp. 199-203.
    • (1983) Advances in Cryptology - Crypto '82 , pp. 199-203
    • Chaum, D.1
  • 6
    • 0031701524 scopus 로고    scopus 로고
    • A security architecture for the internet protocol
    • P. Chen, J. Garay, A. Herzberg, H. Krawczyk, A security architecture for the internet protocol, IBM Systems J. 37 (1) (1998) 42-60.
    • (1998) IBM Systems J. , vol.37 , Issue.1 , pp. 42-60
    • Chen, P.1    Garay, J.2    Herzberg, A.3    Krawczyk, H.4
  • 8
    • 0003200675 scopus 로고
    • Public-key cryptography and re-usable shared secrets
    • H. Baker, F. Piper (Eds.), Claredon Press, Oxford
    • R.A. Croft, S.P. Harris, Public-key cryptography and re-usable shared secrets, in: H. Baker, F. Piper (Eds.), Cryptography and Coding, Claredon Press, Oxford, 1989, pp. 189-201.
    • (1989) Cryptography and Coding , pp. 189-201
    • Croft, R.A.1    Harris, S.P.2
  • 10
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • J. Feigenbaum (Ed.), Advances in Cryptology - Crypto '91, Springer, Berlin
    • Y. Desmedt, Y. Frankel, Shared generation of authenticators and signatures, in: J. Feigenbaum (Ed.), Advances in Cryptology - Crypto '91, Lecture Notes in Computer Science, vol. 576, Springer, Berlin, 1991, pp. 457-469.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 11
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • C. Pomerance (Ed.), Advances in Cryptology - Crypto '87, Springer, Berlin
    • Y. Desmedt, Society and group oriented cryptography: a new concept, in: C. Pomerance (Ed.), Advances in Cryptology - Crypto '87, Lecture Notes in Computer Science, vol. 293, Springer, Berlin, 1987, pp. 120-127.
    • (1987) Lecture Notes in Computer Science , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 12
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • G. Brassard (Ed.), Advances in Cryptology -Crypto '89, Springer, Berlin
    • Y. Desmedt, Y. Frankel, Threshold cryptosystems, in: G. Brassard (Ed.), Advances in Cryptology -Crypto '89, Lecture Notes in Computer Science, vol. 435, Springer, Berlin, 1989, pp. 307-315.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 13
    • 0028462933 scopus 로고
    • Threshold cryptography
    • Y. Desmedt, Threshold cryptography, Eur. Trans. Telecom. 5 (4) (1994) 449-457.
    • (1994) Eur. Trans. Telecom. , vol.5 , Issue.4 , pp. 449-457
    • Desmedt, Y.1
  • 15
  • 16
    • 84958676203 scopus 로고    scopus 로고
    • Proactive RSA
    • B. Kaliski (Ed.), Advances in Cryptology - Crypto '97, Springer, Berlin
    • Y. Frankel, P. Gemmell, P. Mackenzie, M. Yung, Proactive RSA, in: B. Kaliski (Ed.), Advances in Cryptology - Crypto '97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, 1997, pp. 440-454.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 440-454
    • Frankel, Y.1    Gemmell, P.2    Mackenzie, P.3    Yung, M.4
  • 17
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory IT-31 (4) (1985) 469-472.
    • (1985) IEEE Trans. Inform. Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 18
    • 84949189366 scopus 로고    scopus 로고
    • Secure distributed storage and retrieval
    • M. Mavronicolas, P. Tsigas (Eds.), 11th Internat. Workshop, WDAG '97, Springer, Berlin
    • J. Garay, R. Gennaro, C. Jutla, T. Rabin, Secure distributed storage and retrieval, in: M. Mavronicolas, P. Tsigas (Eds.), 11th Internat. Workshop, WDAG '97, Lecture Notes in Computer Science, vol. 1320, Springer, Berlin, 1997, pp. 275-289.
    • (1997) Lecture Notes in Computer Science , vol.1320 , pp. 275-289
    • Garay, J.1    Gennaro, R.2    Jutla, C.3    Rabin, T.4
  • 19
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • N. Koblitz (Ed.), Advances in Cryptology - Crypto '96 Springer, Berlin
    • R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust and efficient sharing of RSA functions, in: N. Koblitz (Ed.), Advances in Cryptology - Crypto '96 Lecture Notes in Computer Science, vol. 1109, Springer, Berlin, 1996, pp. 157-172.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 20
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Ueli Maurer (Ed.), Advances in Cryptology - Eurocrypt '96, Springer, Berlin
    • R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold DSS signatures, in: Ueli Maurer (Ed.), Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science, vol. 1070, Springer, Berlin, 1996, pp. 354-371.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 23
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput. 17 (2) (1988) 281-308.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 24
    • 0028508211 scopus 로고
    • Group oriented (t, n) digital signature scheme
    • L. Harn, Group oriented (t, n) digital signature scheme, IEE Proc.-Comput. Digit. Tech. 141 (5) (1994) 307-313.
    • (1994) IEE Proc.-Comput. Digit. Tech. , vol.141 , Issue.5 , pp. 307-313
    • Harn, L.1
  • 26
    • 84957626176 scopus 로고
    • Proactive secret sharing, or: How to cope with perpetual leakage
    • D. Coppersmith (Ed.), Advances in Cryptology - Crypto '95, Springer, Berlin
    • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing, or: how to cope with perpetual leakage, in: D. Coppersmith (Ed.), Advances in Cryptology - Crypto '95, Lecture Notes in Computer Science, vol. 963, Springer, Berlin, 1995, pp. 339-352.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 29
    • 85028775022 scopus 로고
    • Secret sharing made short
    • D. Stinson (Ed.), Advances in Cryptology - Crypto '93, Springer, Berlin
    • H. Krawczyk, Secret sharing made short, in: D. Stinson (Ed.), Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science, vol. 773, Springer, Berlin, 1993, pp. 136-146.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 136-146
    • Krawczyk, H.1
  • 31
    • 0029769836 scopus 로고    scopus 로고
    • New ElGamal type threshold digital signature scheme
    • C. Park, K. Kurosawa, New ElGamal type threshold digital signature scheme, IEICE Trans. Fundamentals E79-A (1) (1996) 86-93.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.1 , pp. 86-93
    • Park, C.1    Kurosawa, K.2
  • 32
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM 36 (2) (1989) 335-348.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.1
  • 33
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • H. Krawczyk (Ed.), Advances in Cryptology - Crypto '98, Springer, Berlin
    • T. Rabin, A simplified approach to threshold and proactive RSA, in: H. Krawczyk (Ed.), Advances in Cryptology - Crypto '98, LNCS, vol. 1462, Springer, Berlin, 1998, pp. 89-104.
    • (1998) LNCS , vol.1462 , pp. 89-104
    • Rabin, T.1
  • 34
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM 21 (2) (1978) 120-126.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 35
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Comm. ACM 22 (1979) 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.