메뉴 건너뛰기




Volumn 28, Issue 9, 2005, Pages 1421-1430

Some applications of signcryption schemes to distributed protocols

Author keywords

Distributed key generation protocols; Provable security; Random Oracle model; Signcryption; Threshold signcryption schemes

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COSTS; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA; THEOREM PROVING; THRESHOLD LOGIC;

EID: 25844494267     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (16)
  • 1
    • 84947931331 scopus 로고    scopus 로고
    • Some recent research aspects of threshold cryptography
    • Okamoto E., Davida G. and Mambo M. (ed.), Lecture Notes in Computer Science 1396, Berlin: Springer-Verlag
    • Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158-173
    • (1997) Information Security , pp. 158-173
    • Desmedt, Y.1
  • 3
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., Schroeder M.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993-999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 5
    • 84957653598 scopus 로고    scopus 로고
    • Distributed pseudo-random functions and KDCs
    • Jacques (ed.), Lecture Notes in Computer Science 1592, Berlin: Springer-Verlag
    • Naor M., Pinkas B., Reingold O.. Distributed pseudo-random functions and KDCs. In: Jacques ed.. Advances in Cryptology-Eurocrypt '99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 327-346
    • (1999) Advances in Cryptology-Eurocrypt '99 , pp. 327-346
    • Naor, M.1    Pinkas, B.2    Reingold, O.3
  • 6
    • 84942779993 scopus 로고    scopus 로고
    • A distributed and computationally secure key distribution scheme
    • Chan A.H. and Gliger V. (ed.), Lecture Notes in Computer Science 2433, Berlin: Springer
    • Daza V., Herranz J., Padro C., Saez G.. A distributed and computationally secure key distribution scheme. In: Chan A. H., Gliger V. eds.. Information Security. Lecture Notes in Computer Science 2433. Berlin: Springer, 2002, 342-356
    • (2002) Information Security , pp. 342-356
    • Daza, V.1    Herranz, J.2    Padro, C.3    Saez, G.4
  • 7
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature and encryption) ≪ cost(signature) + cost(encryption)
    • Burton S. and Kaliski Jr. (ed.), Lecture Notes in Computer Science 1294, Berlin: Springer
    • Zheng Y.. Digital signcryption or how to achieve cost (signature and encryption) ≪ cost(signature) + cost(encryption). In: Burton S., Kaliski Jr. eds.. Advanced in Cryptology-CRYPTO'97. Lecture Notes in Computer Science 1294. Berlin: Springer, 1997. 165-179
    • (1997) Advanced in Cryptology-CRYPTO '97 , pp. 165-179
    • Zheng, Y.1
  • 8
    • 0031648637 scopus 로고    scopus 로고
    • Using signcryption to build compact and unforgettable key establishment over an ATM network
    • San Francisco, CA, USA
    • Zheng Y., Imai H.. Using signcryption to build compact and unforgettable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM'98, San Francisco, CA, USA, 1998. 411-418
    • (1998) Proceedings of IEEE INFOCOM '98 , pp. 411-418
    • Zheng, Y.1    Imai, H.2
  • 9
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 11
    • 49049089688 scopus 로고    scopus 로고
    • The security of distributed key generation in log-based Cryptosystems
    • Jacques (ed.), Lecture Notes in Computer Science 1592, Berlin: Springer-Verlag
    • Gennaro R., Jarecki S., Krawczyk H., Rabin T.. The security of distributed key generation in log-based Cryptosystems. In: Jacques ed.. Advances in Cryptology-Eurocrypt '99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 295-310
    • (1999) Advances in Cryptology-Eurocrypt '99 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 12
    • 84982943258 scopus 로고
    • Non-Interactive and information-theoretic Secure Verifiable secret sharing
    • Feigenbum (ed.), Lecture Notes in Computer Science 576, Berlin: Springer-Verlag
    • Pedersen T.. Non-Interactive and information-theoretic Secure Verifiable secret sharing. In: Feigenbum ed.. Advances in Cryptology-Crypto'91. Lecture Notes in Computer Science 576. Berlin: Springer-Verlag, 1992, 129-140
    • (1992) Advances in Cryptology-Crypto '91 , pp. 129-140
    • Pedersen, T.1
  • 14
    • 35248836947 scopus 로고    scopus 로고
    • A signature scheme as secure as the Diffie-Hellman problem
    • Biliam E. (ed.), Lecture Notes in Computer Science 2656, Berlin, Springer-Verlag
    • Goh Eu-Jin, Jarecki S.. A signature scheme as secure as the Diffie-Hellman problem. In: Biliam E. ed.. Advances in Cryptology-EUROCRYPT 2003. Lecture Notes in Computer Science 2656. Berlin, Springer-Verlag, 2003, 401-415
    • (2003) Advances in Cryptology-EUROCRYPT 2003 , pp. 401-415
    • Goh, E.-J.1    Jarecki, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.