메뉴 건너뛰기




Volumn , Issue , 2002, Pages 88-97

Asynchronous verifiable secret sharing and proactive cryptosystems

Author keywords

Asynchronous; Model; Proactive; Secret sharing

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA; SERVERS;

EID: 0038687710     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (145)

References (24)
  • 3
    • 84880899710 scopus 로고    scopus 로고
    • Secure and efficient asynchronous broadcast protocols (extended abstract)
    • In J. Kilian, editor; Springer
    • C. Cachin, K. Kursawe, F. Petzold, and V. Shoup. Secure and efficient asynchronous broadcast protocols (extended abstract). In J. Kilian, editor, CRYPTO 2001, volume 2139 of LNCS, pages 524-541. Springer, 2001.
    • (2001) CRYPTO 2001, Volume 2139 of LNCS , pp. 524-541
    • Cachin, C.1    Kursawe, K.2    Petzold, F.3    Shoup, V.4
  • 5
    • 0342880858 scopus 로고
    • Studies in secure multiparty computation and applications
    • PhD thesis, Weizmann Institute
    • R. Canetti. Studies in Secure Multiparty Computation and Applications. PhD thesis, Weizmann Institute, 1995.
    • (1995)
    • Canetti, R.1
  • 8
    • 4944253148 scopus 로고    scopus 로고
    • Maintaining authenticated communication in the presence of break-ins
    • R. Canetti, S. Halevi, and A. Herzberg. Maintaining authenticated communication in the presence of break-ins. J. Cryptology, 13(1):61-106, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 61-106
    • Canetti, R.1    Halevi, S.2    Herzberg, A.3
  • 13
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • Apr.
    • M. J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, Apr. 1985.
    • (1985) J. ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.S.3
  • 14
    • 49049089688 scopus 로고    scopus 로고
    • Secure key generation for discrete-log based cryptosystems
    • In J. Stern, editor; Springer
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure key generation for discrete-log based cryptosystems. In J. Stern, editor, EUROCRYPT'99, volume 1592 of LNCS, pages 295-310. Springer, 1999.
    • (1999) EUROCRYPT'99, Volume 1592 of LNCS , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 15
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Feb.
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Computing, 18(1):186-208, Feb. 1989.
    • (1989) SIAM J. Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 16
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Apr.
    • S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, Apr. 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 17
    • 0003070483 scopus 로고
    • Fault-tolerant broadcasts and related problems
    • In S. J. Mullender, editor; ACM Press & Addison-Wesley, New York
    • V. Hadzilacos and S. Toueg. Fault-tolerant broadcasts and related problems. In S. J. Mullender, editor, Distributed Systems. ACM Press & Addison-Wesley, New York, 1993.
    • (1993) Distributed Systems
    • Hadzilacos, V.1    Toueg, S.2
  • 18
    • 84957626176 scopus 로고
    • Proactive secret sharing or how to cope with perpetual leakage
    • In D. Coppersmith, editor; Springer
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or how to cope with perpetual leakage. In D. Coppersmith, editor, CRYPTO '95, volume 963 of LNCS, pages 339-352. Springer, 1995.
    • (1995) CRYPTO '95, Volume 963 of LNCS , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 21
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • Apr.
    • M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. J. ACM, 27(2):228-234, Apr. 1980.
    • (1980) J. ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 22
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • In J. Feigenbaum, editor; Springer
    • T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, CRYPTO '91, volume 576 of LNCS, pages 129-140. Springer, 1992.
    • (1992) CRYPTO '91, Volume 576 of LNCS , pp. 129-140
    • Pedersen, T.P.1
  • 23
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • In B. Preneel, editor; Springer
    • V. Shoup. Practical threshold signatures. In B. Preneel, editor, EUROCRYPT 2000, volume 1087 of LNCS, pages 207-220. Springer, 2000.
    • (2000) EUROCRYPT 2000, Volume 1087 of LNCS , pp. 207-220
    • Shoup, V.1
  • 24
    • 0037952468 scopus 로고    scopus 로고
    • Towards Fault-Tolerant and Secure On-Line Services
    • PhD thesis, Cornell University, USA
    • L. Zhou. Towards fault-tolerant and secure on-line services. PhD thesis, Cornell University, USA, 2001.
    • (2001)
    • Zhou, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.