메뉴 건너뛰기




Volumn 31, Issue 2, 2004, Pages 99-123

Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders

Author keywords

Efficient computation; Quadratic field idea arithmetic; Undeniable signature

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER SOFTWARE; CRYPTOGRAPHY; NETWORK PROTOCOLS; QUADRATIC PROGRAMMING; SERVERS; WORLD WIDE WEB;

EID: 1242307426     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:DESI.0000012439.20075.16     Document Type: Article
Times cited : (11)

References (35)
  • 1
    • 84966198660 scopus 로고
    • Explicit bounds for primality testing and related problems
    • E. Bach, Explicit bounds for primality testing and related problems, Mathematics of Computation, Vol. 55 (1990) pp. 355-380.
    • (1990) Mathematics of Computation , vol.55 , pp. 355-380
    • Bach, E.1
  • 3
    • 0242355920 scopus 로고    scopus 로고
    • An analysis of the reduction algorithms for binary quadratic forms
    • P. Engel and H. Syta eds., Institute of Mathematics of National Academy of Sciences, Kyiv, Ukraine
    • I. Biehl and J. Buchmann, An analysis of the reduction algorithms for binary quadratic forms, In (P. Engel and H. Syta eds.), Voronoi's Impact on Modern Science, Vol. I, Institute of Mathematics of National Academy of Sciences, Kyiv, Ukraine (1998).
    • (1998) Voronoi's Impact on Modern Science , vol.1
    • Biehl, I.1    Buchmann, J.2
  • 5
    • 0024139987 scopus 로고
    • A key-exchange system based on imaginary quadratic fields
    • J. Buchmann and H. C. Williams, A key-exchange system based on imaginary quadratic fields, Journal of Cryptology, Vol. 1 (1988) pp. 107-118.
    • (1988) Journal of Cryptology , vol.1 , pp. 107-118
    • Buchmann, J.1    Williams, H.C.2
  • 10
    • 0003484756 scopus 로고
    • John Wiley & Sons, New York
    • 2, John Wiley & Sons, New York (1989).
    • (1989) 2
    • Cox, D.A.1
  • 13
    • 14944351892 scopus 로고    scopus 로고
    • ECMNET Project, http://www.loria.fr/̃zimmerma/records/ecmnet.html
    • ECMNET Project
  • 14
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm in GF(p)
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithm in GF(p), IEEE Transactions on Information Theory, Vol. 31 (1985) pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 17
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM J. Computing, Vol. 18 (1986) pp. 186-208.
    • (1986) SIAM J. Computing , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 20
    • 84968519059 scopus 로고
    • A rigorous subexponential algorithm for computation of class groups
    • J. L. Hafner and K. S. McCurley, A rigorous subexponential algorithm for computation of class groups, J. Amer. Math. Soc., Vol. 2 (1989) pp. 837-850.
    • (1989) J. Amer. Math. Soc. , vol.2 , pp. 837-850
    • Hafner, J.L.1    McCurley, K.S.2
  • 21
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H. W. Lenstra, Jr., Factoring integers with elliptic curves, Annals of Mathematics, Vol. 126 (1987) pp. 649-673.
    • (1987) Annals of Mathematics , vol.126 , pp. 649-673
    • Lenstra Jr., H.W.1
  • 22
    • 1242336535 scopus 로고
    • Fast and rigorous factorization under the generalized Riemann hypothesis
    • University of Chicago
    • H. W. Lenstra, Jr., Fast and rigorous factorization under the generalized Riemann hypothesis, Tech. Report 87-007, University of Chicago (1987).
    • (1987) Tech. Report , vol.87 , Issue.7
    • Lenstra Jr., H.W.1
  • 23
    • 0003638131 scopus 로고
    • The development of the number field sieve
    • Springer-Verlag, Berlin, Heidelberg
    • A. K. Lenstra and H. W. Lenstra, Jr. (eds.), The development of the number field sieve, Lecture Notes in Mathematics, 1554, Springer-Verlag, Berlin, Heidelberg (1991).
    • (1991) Lecture Notes in Mathematics , vol.1554
    • Lenstra, A.K.1    Lenstra Jr., H.W.2
  • 24
    • 0024139776 scopus 로고
    • A key distribution system equivalent to factoring
    • K. S. McCurley, A key distribution system equivalent to factoring, Journal of Cryptology, Vol. 1 (1988) pp. 95-105.
    • (1988) Journal of Cryptology , vol.1 , pp. 95-105
    • McCurley, K.S.1
  • 27
    • 0024983231 scopus 로고
    • Public key cryptoSystems provably secure against chosen ciphertext attacks
    • M. Naor and M. Yung, Public key cryptoSystems provably secure against chosen ciphertext attacks, Proceedings of STOC 22 (1990) pp. 427-437.
    • (1990) Proceedings of STOC , vol.22 , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 28
    • 0842327115 scopus 로고    scopus 로고
    • A new public-key cryptosystem over quadratic orders with quadratic decryption time
    • S. Paulus and T. Takagi, A new public-key cryptosystem over quadratic orders with quadratic decryption time, Journal of Cryptology, Vol. 13, No. 2 (2000) pp. 263-272.
    • (2000) Journal of Cryptology , vol.13 , Issue.2 , pp. 263-272
    • Paulus, S.1    Takagi, T.2
  • 29
    • 0030123384 scopus 로고    scopus 로고
    • Faster factoring of integers of a special form
    • R. Peralta and E. Okamoto, Faster factoring of integers of a special form, IEICE Trans. Fundamentals, Vol. E79-A, No. 4 (1996) pp. 489-493.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.4 , pp. 489-493
    • Peralta, R.1    Okamoto, E.2
  • 31
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir and L. M. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, Vol. 21, No. 2 (1978) pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.M.3
  • 33
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • J. Rompel, One-way functions are necessary and sufficient for secure signatures, Proceedings of STOC 22 (1990) pp. 387-394.
    • (1990) Proceedings of STOC , vol.22 , pp. 387-394
    • Rompel, J.1
  • 34
    • 0038933271 scopus 로고
    • Quadratic fields and factorization
    • H. W. Lenstra and R. Tijdeman eds., Math. Centrum Tracts 155, Part II, Amsterdam
    • R. J. Schoof, Quadratic fields and factorization, In (H. W. Lenstra and R. Tijdeman eds.), Computational Methods in Number Theory, Math. Centrum Tracts 155, Part II, Amsterdam (1983) pp. 235-286.
    • (1983) Computational Methods in Number Theory , pp. 235-286
    • Schoof, R.J.1
  • 35
    • 1242268990 scopus 로고
    • On Gauss and composition I, II
    • R. A. Mollin ed., Kluwer Academic Press
    • D. Shanks, On Gauss and composition I, II, In (R. A. Mollin ed.), NATO ASI on Number Theory and Applications, Kluwer Academic Press (1989) pp. 163-179.
    • (1989) NATO ASI on Number Theory and Applications , pp. 163-179
    • Shanks, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.