메뉴 건너뛰기




Volumn 162, Issue 3, 2005, Pages 1119-1134

A threshold signature scheme based on the elliptic curve cryptosystem

Author keywords

Elliptic curve cryptosystem; Identity authentication; Internet security; Threshold signature

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; DATA TRANSFER; ELECTRONIC COMMERCE; INTERNET; INTERPOLATION; LAGRANGE MULTIPLIERS; ONLINE CONFERENCING; POLYNOMIALS; SECURITY OF DATA;

EID: 12244277653     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2004.01.018     Document Type: Article
Times cited : (8)

References (11)
  • 3
    • 0001318089 scopus 로고
    • Safeguarding Cryptographic Keys
    • Montvale: AFIPS Press
    • Blakely G.R. Safeguarding Cryptographic Keys. Proc. NCC. vol. 48:1979;313-317 AFIPS Press, Montvale
    • (1979) Proc. NCC , vol.48 , pp. 313-317
    • Blakely, G.R.1
  • 5
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • Beller M.J., Yacobi Y. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters. 29:1993;999-1001
    • (1993) Electronics Letters , vol.29 , pp. 999-1001
    • Beller, M.J.1    Yacobi, Y.2
  • 7
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation. 48:1987;203-209
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 9
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ELGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory. IT-31(4):1985;469-472
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.