메뉴 건너뛰기




Volumn 16, Issue 6, 2000, Pages 835-846

(t, n) threshold untraceable signatures

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INFORMATION RETRIEVAL SYSTEMS; INTERPOLATION; LAGRANGE MULTIPLIERS; POLYNOMIALS;

EID: 0034317142     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (21)
  • 1
    • 84950897985 scopus 로고
    • Security of number theoretic public key cryptosystems against random attack
    • three parts: 1978
    • B. Blakley and G. R. Blakley, "Security of number theoretic public key cryptosystems against random attack," Cryptologia, 1978, in three parts: Part 1: Vol. 2, No. 4, 1978, pp.305-321; Part 2: Vol. 3, No. 1, 1979, pp. 29-42; Part 3: Vol. 3, No. 2, 1979, pp. 105-118.
    • (1978) Cryptologia , vol.2 , Issue.4 PART 1 , pp. 305-321
    • Blakley, B.1    Blakley, G.R.2
  • 2
    • 84950897985 scopus 로고
    • B. Blakley and G. R. Blakley, "Security of number theoretic public key cryptosystems against random attack," Cryptologia, 1978, in three parts: Part 1: Vol. 2, No. 4, 1978, pp.305-321; Part 2: Vol. 3, No. 1, 1979, pp. 29-42; Part 3: Vol. 3, No. 2, 1979, pp. 105-118.
    • (1979) Cryptologia , vol.3 , Issue.1 PART 2 , pp. 29-42
  • 3
    • 84950923057 scopus 로고
    • B. Blakley and G. R. Blakley, "Security of number theoretic public key cryptosystems against random attack," Cryptologia, 1978, in three parts: Part 1: Vol. 2, No. 4, 1978, pp.305-321; Part 2: Vol. 3, No. 1, 1979, pp. 29-42; Part 3: Vol. 3, No. 2, 1979, pp. 105-118.
    • (1979) Cryptologia , vol.3 , Issue.2 PART 3 , pp. 105-118
  • 4
    • 0018711581 scopus 로고
    • RSA public key cryptosystems do not always conceal messages
    • G. R. Blakley and I. Borosh, "RSA public key cryptosystems do not always conceal messages," Computers & Mathematics with Applications, Vol. 5, No. 3, 1979, pp. 169-178.
    • (1979) Computers & Mathematics with Applications , vol.5 , Issue.3 , pp. 169-178
    • Blakley, G.R.1    Borosh, I.2
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • IT-31
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information, IT-31, 1985, pp. 469-472.
    • (1985) IEEE Transactions on Information , pp. 469-472
    • ElGamal, T.1
  • 7
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solution to identification and signature problems
    • A. Fiat and A. Shamir, "How to prove yourself: Practical solution to identification and signature problems," in Proceedings of Advances in Cryptology - Crypto '86, 1987, pp. 186-199.
    • (1987) Proceedings of Advances in Cryptology - Crypto '86 , pp. 186-199
    • Fiat, A.1    Shamir, A.2
  • 9
    • 0028508211 scopus 로고
    • Group-oriented (t, n) threshold digital signature scheme and digital multisignature
    • L. Harn, "Group-oriented (t, n) threshold digital signature scheme and digital multisignature," IEE Proceedings on Computer Digital Technology, Vol. 141, No. 5, 1994, pp. 307-313.
    • (1994) IEE Proceedings on Computer Digital Technology , vol.141 , Issue.5 , pp. 307-313
    • Harn, L.1
  • 11
    • 84948965443 scopus 로고
    • Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders
    • C. Li, T. Hwang, and N. Lee, "Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders," in Proceedings of Advances in Cryptology - EuroCrypto '94, 1994, pp. 194-204.
    • (1994) Proceedings of Advances in Cryptology - Eurocrypto '94 , pp. 194-204
    • Li, C.1    Hwang, T.2    Lee, N.3
  • 14
    • 0024104968 scopus 로고
    • A digital multisignature scheme using bijective public-key cryptosystems
    • T. Okamoto, "A digital multisignature scheme using bijective public-key cryptosystems," ACM Tranactions on Computer Systems, Vol. 6, No. 8, 1988, pp. 432-441.
    • (1988) ACM Tranactions on Computer Systems , vol.6 , Issue.8 , pp. 432-441
    • Okamoto, T.1
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Communications of ACM, Vol. 21, No. 2, 1978, pp. 120-126.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 16
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of ACM, Vol. 22, 1979, pp. 612-613.
    • (1979) Communications of ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 18
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • M. Tompa and H. Woll, "How to share a secret with cheaters," Jounal of Cryptol, Vol. 1, No. 2, 1988, pp.133-138.
    • (1988) Jounal of Cryptol , vol.1 , Issue.2 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 20
    • 0029638543 scopus 로고
    • Fair construction of a secret
    • H. Lin and L. Harn, "Fair construction of a secret," Information Processing Letters, Vol. 55, No. 1, 1994, pp. 45-47.
    • (1994) Information Processing Letters , vol.55 , Issue.1 , pp. 45-47
    • Lin, H.1    Harn, L.2
  • 21
    • 0029369348 scopus 로고
    • Cheating detection and cheater identification in secret sharing schemes
    • T. C. Wu and T. S. Wu, "Cheating detection and cheater identification in secret sharing schemes," IEE Proceedings of Computer Digital Technology, Vol. 142, No. 5, 1995, pp. 367-369.
    • (1995) IEE Proceedings of Computer Digital Technology , vol.142 , Issue.5 , pp. 367-369
    • Wu, T.C.1    Wu, T.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.