메뉴 건너뛰기




Volumn 3352, Issue , 2005, Pages 91-104

Threshold cryptography in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 23944512882     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30598-9_7     Document Type: Conference Paper
Times cited : (8)

References (22)
  • 1
    • 33645584906 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • J. Algesheimer, J. Camenisch, and V. Shoup, Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products, in Proc. of CRYPTO 2002.
    • Proc. of CRYPTO 2002
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 2
    • 33645418086 scopus 로고    scopus 로고
    • Efficient threshold signatures, multisignature and blind signature schemes based on the gap-diffie-hellman-group signature scheme
    • A. Boldyreva, Efficient Threshold Signatures, Multisignature and Blind Signature Schemes based on the Gap-Diffie-Hellman-group Signature Scheme, in Proc. of Public-Key Cryptography 2003.
    • Proc. of Public-key Cryptography 2003
    • Boldyreva, A.1
  • 6
    • 0141911507 scopus 로고    scopus 로고
    • Multiplicative non-abelian sharing schemes and their application to threshold cryptography
    • Y. Desmedt, G. Di Crescenzo and M. Burmester, Multiplicative Non-Abelian Sharing Schemes and their Application to Threshold Cryptography, in Proc. of Asiacrypt 94.
    • Proc. of Asiacrypt 94
    • Desmedt, Y.1    Di Crescenzo, G.2    Burmester, M.3
  • 8
    • 0000266745 scopus 로고    scopus 로고
    • Shared authentication of authenticators and signatures
    • Y. Desmedt and Y. Frankel, Shared Authentication of Authenticators and Signatures, in Proc. of CRYPTO 91.
    • Proc. of CRYPTO 91
    • Desmedt, Y.1    Frankel, Y.2
  • 11
    • 0000613666 scopus 로고    scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • P. Feldman, A Practical Scheme for Non-Interactive Verifiable Secret Sharing, in Proc. of FOGS 87.
    • Proc. of FOGS 87
    • Feldman, P.1
  • 12
  • 13
    • 3142697332 scopus 로고    scopus 로고
    • Fully distributed threshold RSA under standard assumptions
    • A. Fouque and J. Stern, Fully Distributed Threshold RSA under Standard Assumptions, in Proc. of Asiacrypt 2001.
    • Proc. of Asiacrypt 2001
    • Fouque, A.1    Stern, J.2
  • 19
    • 0000845043 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • T. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, in Proc. of CRYPTO 91.
    • Proc. of CRYPTO 91
    • Pedersen, T.1
  • 20
    • 0000135789 scopus 로고    scopus 로고
    • A threshold cryptosystem without a trusted party
    • T. Pedersen, A threshold Cryptosystem without a Trusted Party, in Proc. of Eurocrypt 91.
    • Proc. of Eurocrypt 91
    • Pedersen, T.1
  • 22
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing Ad Hoc Networks, in IEEE Network Magazine, vol. 13, no.6, 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.