메뉴 건너뛰기




Volumn 22, Issue , 2003, Pages 163-171

Efficient revocation and threshold pairing based cryptosystems

Author keywords

Bilinear maps; Public key cryptosystems; Revocation

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER ARCHITECTURE; COMPUTER CRIME; COMPUTER SIMULATION; DATA COMPRESSION; DATABASE SYSTEMS; FUNCTIONS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 1142293103     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/872035.872059     Document Type: Conference Paper
Times cited : (123)

References (29)
  • 2
    • 0842304790 scopus 로고    scopus 로고
    • Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme
    • Springer
    • A. Boldyreva. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. In Proceedings of PKC'03, Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Proceedings of PKC'03, Lecture Notes in Computer Science
    • Boldyreva, A.1
  • 7
    • 35248844436 scopus 로고    scopus 로고
    • An Identity-Based Signature from Gap Diffie-Hellman Groups
    • Lecture Notes in Computer Science. Springer
    • J. Cha and J. Cheon. An Identity-Based Signature from Gap Diffie-Hellman Groups. In Proceedings of PKC'03, Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Proceedings of PKC'03
    • Cha, J.1    Cheon, J.2
  • 9
    • 35248845998 scopus 로고    scopus 로고
    • Simple Identity-Based Cryptography with Mediated RSA
    • Lecture Notes in Computer Science. Springer
    • X. Ding and G. Tsudik. Simple Identity-Based Cryptography with Mediated RSA. In Proceedings of CT-RSA '03, Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Proceedings of CT-RSA '03
    • Ding, X.1    Tsudik, G.2
  • 14
    • 0021409284 scopus 로고
    • Probabilistic Encryption
    • S. Goldwasser and S. Micali. Probabilistic Encryption. JCSS 28(2): 270-299 (1984).
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 16
    • 1642407903 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Lecture Notes in Computer Science. Springer
    • F. Hess. Efficient identity based signature schemes based on pairings. In proceedings of SAC'02, Lecture Notes in Computer Science. Springer, 2002.
    • (2002) Proceedings of SAC'02
    • Hess, F.1
  • 18
  • 21
    • 0024983231 scopus 로고
    • Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
    • ACM Press, New York
    • nd STOC, pages 427-437. ACM Press, New York, 1990.
    • (1990) nd STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 23
    • 0029769836 scopus 로고    scopus 로고
    • New el gamal type threshold digital signature scheme
    • C. Park and K. Kurosawa. New el gamal type threshold digital signature scheme. IEICE Trans., Vol.E79-A, No. 1 (1996) 86-93.
    • (1996) IEICE Trans. , vol.E79-A , Issue.1 , pp. 86-93
    • Park, C.1    Kurosawa, K.2
  • 24
    • 0003614758 scopus 로고
    • Digital Signatures and Public Key Functions as Intractable as Factoring
    • Lab. for Computer Science, MIT
    • M. Rabin. Digital Signatures and Public Key Functions as Intractable as Factoring. Technical Memo TM-212, Lab. for Computer Science, MIT, 1979.
    • (1979) Technical Memo , vol.TM-212
    • Rabin, M.1
  • 28
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the weil pairing
    • N. Smart. An identity based authenticated key agreement protocol based on the weil pairing. Electronic Letters, 38(13): 630-632, 2002.
    • (2002) Electronic Letters , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.1
  • 29
    • 84958772823 scopus 로고    scopus 로고
    • Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold scheme for Implicit Certificates
    • Springer
    • D. Stinson and R. Strobl. Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold scheme for Implicit Certificates. In proc. of ACISP'01, volume 2119 of Lecture Notes in Computer Science, pages 417-434. Springer, 2001.
    • (2001) Proc. of ACISP'01, Volume 2119 of Lecture Notes in Computer Science , vol.2119 , pp. 417-434
    • Stinson, D.1    Strobl, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.