메뉴 건너뛰기




Volumn 14, Issue 6, 2003, Pages 1164-1171

Two classes of robust threshold key escrow schemes

Author keywords

ElGamal cryptosystem; Escrow agent; Improved RSA cryptosystem; Key escrow; Monitor; Robustness; Threshold scheme

Indexed keywords

ALGORITHMS; COMMUNICATION; MONITORING; ROBUSTNESS (CONTROL SYSTEMS); THRESHOLD LOGIC;

EID: 0141719369     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (22)
  • 2
    • 0011960231 scopus 로고
    • Partial key escrow: A new approach to software key escrow
    • Washington
    • Shamir A. Partial key escrow: A new approach to software key escrow. In: Proceedings of the Key Escrow Conference. Washington, 1995.
    • (1995) Proceedings of the Key Escrow Conference
    • Shamir, A.1
  • 3
    • 84947439162 scopus 로고
    • A key escrow system with warrant bound
    • Coppersmith D.(ed.), LNCS 963, Berlin: Springer-Vrelag
    • Lenstra AK, Winkler P, Yacobi Y. A key escrow system with warrant bound. In: Coppersmith D, ed. Proceedings of the Crypto'95. LNCS 963, Berlin: Springer-Vrelag, 1995. 197-207.
    • (1995) Proceedings of the Crypto.'95 , pp. 197-207
    • Lenstra, A.K.1    Winkler, P.2    Yacobi, Y.3
  • 4
    • 0041591168 scopus 로고
    • Fair cryptosystems
    • Technique Report, MIT/LCS/TR-579.c, Cambridge: Massachusetts Institute of Technology
    • Micali S. Fair cryptosystems. Technique Report, MIT/LCS/TR-579.c, Cambridge: Massachusetts Institute of Technology, 1994.
    • (1994)
    • Micali, S.1
  • 5
    • 84957658795 scopus 로고
    • A simple method for generating and sharing pseudo-random functions with application to clipper-like key escrow system
    • Coppersmith D.(ed.), LNCS 963, Berlin: Springer-Verlag
    • Micali S, Ney R. A simple method for generating and sharing pseudo-random functions with application to clipper-like key escrow system. In: Coppersmith D, ed. Proceedings of the Crypto'95. LNCS 963, Berlin: Springer-Verlag, 1995. 184-196.
    • (1995) Proceedings of the Crypto.'95 , pp. 184-196
    • Micali, S.1    Ney, R.2
  • 6
    • 0032258223 scopus 로고    scopus 로고
    • A new secret sharing threshold scheme and key escrow system
    • Chinese source
    • Yang Bo, Ma WP, Wang, YM. A new secret sharing threshold scheme and key escrow system. Acta Electronica Sinica, 1998, 26(10): 1-3 (in Chinese with English abstract).
    • (1998) Acta Electronica Sinica , vol.26 , Issue.10 , pp. 1-3
    • Yang, B.1    Ma, W.P.2    Wang, Y.M.3
  • 7
    • 0030270929 scopus 로고    scopus 로고
    • A public-key-based key escrow system
    • Nechvatal J. A public-key-based key escrow system. Journal of Systems Software, 1996, 35(1): 73-83.
    • (1996) Journal of Systems Software , vol.35 , Issue.1 , pp. 73-83
    • Nechvatal, J.1
  • 8
    • 9744287313 scopus 로고    scopus 로고
    • Description of key escrow system
    • Denning DE. Description of key escrow system. 1997. http://www.cs.georgetown.edu/-denning/crypto/Appendix.html/.
    • (1997)
    • Denning, D.E.1
  • 9
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Brassard G.(ed.), LNCS 435, Berlin: Springer-Verlag
    • Desmedt Y, Frankel Y. Threshold cryptosystems. In: Brassard G, ed. Proceedings of the Crypto'89. LNCS 435, Berlin: Springer-Verlag, 1990. 307-315.
    • (1990) Proceedings of the Crypto.'89 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 10
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Feigenbaum J.(ed.), LNCS 576, Berlin: Springer-Verlag
    • Desmedt Y, Frankel Y. Shared generation of authenticators and signatures. In: Feigenbaum J, ed. Proceedings of the Crypto'91. LNCS 576, Berlin: Springer-Verlag, 1992. 457-469.
    • (1992) Proceedings of the Crypto.'91 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 12
    • 84947441722 scopus 로고    scopus 로고
    • Robust arid efficient sharing of RSA functions
    • Koblitz N.(ed.), LNCS 1109, Berlin: Springer-Verlag
    • Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust arid efficient sharing of RSA functions. In: Koblitz N, ed. Proceedings of the Crypto'96. LNCS 1109, Berlin: Springer-Verlag, 1996. 157-172.
    • (1996) Proceedings of the Crypto.'96 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 13
    • 0035416443 scopus 로고    scopus 로고
    • A threshold key escrow scheme based on public key cryptosystem
    • Chinese source
    • Cao ZF, A threshold key escrow scheme based on public key cryptosystem. Science in China (Series E), 2001, 44(4): 441-448 (in Chinese with English abstract).
    • (2001) Science in China (Series E) , vol.44 , Issue.4 , pp. 441-448
    • Cao, Z.F.1
  • 14
    • 0036554764 scopus 로고    scopus 로고
    • A threshold key escrow scheme based on ElGamal cryptosystem
    • Chinese source
    • Cao ZF, Li JG. A threshold key escrow scheme based on ElGamal cryptosystem. Chinese Journal of Computers, 2002, 25(4): 346-350 (in Chinese with English abstract).
    • (2002) Chinese Journal of Computers , vol.25 , Issue.4 , pp. 346-350
    • Cao, Z.F.1    Li, J.G.2
  • 15
    • 0034309495 scopus 로고    scopus 로고
    • Weaknesses of some threshold group signature schemes
    • Chinese source
    • Wang GL, Qing SH. Weaknesses of some threshold group signature schemes. Journal of Software, 2000, 11(10): 1326-1332 (in Chinese with English abstract).
    • (2000) Journal of Software , vol.11 , Issue.10 , pp. 1326-1332
    • Wang, G.L.1    Qing, S.H.2
  • 16
    • 0027580298 scopus 로고
    • Efficient and secure multiparty generation of digital signatures based on discrete logarithms
    • Cerecedo M, Matsumoto T, Imai H. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Transactions on Fundamentals, 1993, E76-A(4): 532-545.
    • (1993) IEICE Transactions on Fundamentals , vol.E76-A , Issue.4 , pp. 532-545
    • Cerecedo, M.1    Matsumoto, T.2    Imai, H.3
  • 19
    • 0141595582 scopus 로고
    • Chinese source, Harbin: Heilongjiang Education Press
    • Cao ZF. Public Key Cryptology. Harbin: Heilongjiang Education Press, 1993. 158-185 (in Chinese).
    • (1993) Public Key Cryptology , pp. 158-185
    • Cao, Z.F.1
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 1978, 21(2): 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithm
    • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.