메뉴 건너뛰기




Volumn 1, Issue 1, 2004, Pages 34-47

CODEX: A robust and secure secret distribution system

Author keywords

Access controls; Client server and multitier systems; Distributed systems; Fault tolerance; Information storage

Indexed keywords

CRYPTOGRAPHY; DATA STORAGE EQUIPMENT; DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); SERVERS;

EID: 12344279229     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2004.3     Document Type: Article
Times cited : (45)

References (41)
  • 1
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • R.E. Merwin, et al. eds., Sept.
    • G.R. Blakley, "Safeguarding Cryptographic Keys," Proc. 1979 Nat'l Computer COnf., R.E. Merwin, et al. eds., pp. 313-317, Sept. 1979.
    • (1979) Proc. 1979 Nat'l Computer COnf. , pp. 313-317
    • Blakley, G.R.1
  • 2
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures (position paper)
    • M. Blaze, J. Feigenbaum, and A.D. Keromytis, "KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)," Lecture Notes in Computer Science, vol. 1550, pp. 59-63, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 6
    • 0028462933 scopus 로고
    • Threshold cryptography
    • July-Aug.
    • Y. Desmedt, "Threshold Cryptography," European Trans. Telecomm., vol. 5, no. 4, pp. 449-457, July-Aug. 1994.
    • (1994) European Trans. Telecomm. , vol.5 , Issue.4 , pp. 449-457
    • Desmedt, Y.1
  • 11
    • 0034318740 scopus 로고    scopus 로고
    • Scalable secure one-to-many group communication using dual encryption
    • Nov.
    • L. Dondeti, S. Mukherjee, and A. Samal, "Scalable Secure One-to-Many Group Communication Using Dual Encryption," Computer Comm., vol. 23, no. 17, pp. 1681-1701, Nov. 2000.
    • (2000) Computer Comm. , vol.23 , Issue.17 , pp. 1681-1701
    • Dondeti, L.1    Mukherjee, S.2    Samal, A.3
  • 12
    • 84874800178 scopus 로고
    • A public-key cryptoSystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A Public-Key CryptoSystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Trans. Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 13
    • 0013443796 scopus 로고    scopus 로고
    • Multimedia security in group communications: Recent progress in wired and wireless networks
    • Nov.
    • A. Eskicioglu, "Multimedia Security in Group Communications: Recent Progress in Wired and Wireless Networks," Proc. IASTED Int'l Conf. Comm. and Computer Networks, pp. 125-133, Nov. 2002.
    • (2002) Proc. IASTED Int'l Conf. Comm. and Computer Networks , pp. 125-133
    • Eskicioglu, A.1
  • 14
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • Apr.
    • M.J. Fischer, N.A. Lynch, and M.S. Paterson, "Impossibility of Distributed Consensus with One Faulty Process," J. ACM, vol. 32, no. 2, pp. 374-382, Apr. 1985.
    • (1985) J. ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.S.3
  • 20
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • June
    • L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE J. Selected Areas in Comm., vol. 11, no. 5, pp. 657- 662, June 1993.
    • (1993) IEEE J. Selected Areas in Comm. , vol.11 , Issue.5 , pp. 657-662
    • Gong, L.1
  • 21
    • 0001654317 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • C.G. Günther, ed., May
    • L.C. Guillou and J.-J. Quisquater, "A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory," Proc. Workshop the Theory and Application of Cryptographic Techniques, C.G. Günther, ed., May 1988.
    • (1988) Proc. Workshop the Theory and Application of Cryptographic Techniques
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 27
    • 0010316932 scopus 로고
    • master's thesis, Dept. of Electrical Eng. and Computer Science, Massachusetts Inst. of Technology, Cambridge, Sept.
    • S. Jarecki, "Proactive Secret Sharing and Public Key Cryptosystems," master's thesis, Dept. of Electrical Eng. and Computer Science, Massachusetts Inst. of Technology, Cambridge, Sept. 1995.
    • (1995) Proactive Secret Sharing and Public Key Cryptosystems
    • Jarecki, S.1
  • 28
    • 0032306029 scopus 로고    scopus 로고
    • Byzantine quorum systems
    • D. Malkhi and M. Reiter, "Byzantine Quorum Systems," Distributed Computing, vol. 11, no. 4, pp. 203-213, 1998.
    • (1998) Distributed Computing , vol.11 , Issue.4 , pp. 203-213
    • Malkhi, D.1    Reiter, M.2
  • 34
    • 0017930809 scopus 로고
    • A method of obtaining digital signature and public key systems
    • R. Rivest, A. Shamir, and L. Adleman, "A Method of Obtaining Digital Signature and Public Key Systems," Comm. ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 35
    • 0003614529 scopus 로고    scopus 로고
    • SDSI - A simple distributed security infrastructure
    • R.L. Rivest and B. Lampson, "SDSI - A Simple Distributed Security Infrastructure," Proc. CRYPTO '96 Conf., 1996.
    • (1996) Proc. CRYPTO '96 Conf.
    • Rivest, R.L.1    Lampson, B.2
  • 38
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov.
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 39
    • 12344290414 scopus 로고    scopus 로고
    • Distributed blinding for ElGamal re-encryption
    • Cornell Univ., Ithaca, New York, Jan.
    • L. Zhou, M.A. Marsh, F.B. Schneider, and A. Redz, "Distributed Blinding for ElGamal Re-Encryption," Technical Report TR 2004-1920, Cornell Univ., Ithaca, New York, Jan. 2004.
    • (2004) Technical Report , vol.TR 2004-1920
    • Zhou, L.1    Marsh, M.A.2    Schneider, F.B.3    Redz, A.4
  • 40
  • 41
    • 12344282882 scopus 로고    scopus 로고
    • Proactive secret sharing in asynchronous systems
    • Cornell Univ., Ithaca, New York, Oct.
    • L. Zhou, F.B. Schneider, and R. van Renesse, "Proactive Secret Sharing in Asynchronous Systems," Technical Report TR 2002-1877, Cornell Univ., Ithaca, New York, Oct. 2002.
    • (2002) Technical Report , vol.TR 2002-1877
    • Zhou, L.1    Schneider, F.B.2    Van Renesse, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.