메뉴 건너뛰기




Volumn 3580, Issue , 2005, Pages 128-139

Bounds on the efficiency of "black-box" commitment schemes

Author keywords

[No Author keywords available]

Indexed keywords

FUNCTIONS; SECURITY OF DATA; STATISTICAL METHODS;

EID: 26444463784     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11523468_11     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 2
    • 26444485170 scopus 로고
    • (See also SIGACT News, vol. 15(1), 1983.)
    • (1983) SIGACT News , vol.15 , Issue.1
  • 3
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. In SIAM J. Computing, vol. 13(4), pp. 850-864, 1984.
    • (1984) SIAM J. Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 7
    • 85028838274 scopus 로고
    • On the cryptographic applications of random functions
    • LNCS, Springer-Verlag
    • O. Goldreich, S. Goldwasser, and S. Micali. On the Cryptographic Applications of Random Functions. In Advances in Cryptology - CRYPTO 84, LNCS vol. 263, Springer-Verlag, pp. 276-288, 1985.
    • (1985) Advances in Cryptology - CRYPTO 84 , vol.263 , pp. 276-288
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 8
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. In J. ACM, vol. 33(4), pp. 792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 10
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Håstad, R. Impagliazzo, L. Levin, and M. Luby. A Pseudorandom Generator From any One-Way Function. In SIAM J. Computing, vol. 28(4), pp. 1364-1396, 1999.
    • (1999) SIAM J. Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.3    Luby, M.4
  • 14
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor. Bit Commitment Using Pseudorandomness. In J. Cryptology, vol. 4(2), pp. 151-158, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 15
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM
    • M. Naor and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In 21st ACM Symposium on Theory of Computing (STOC), ACM, pp. 33-43, 1989.
    • (1989) 21st ACM Symposium on Theory of Computing (STOC) , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 17
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • ACM
    • J. Rompel. One-Way Functions are Necessary and Sufficient for Secure Signatures. In 22nd ACM Symposium on Theory of Computing (STOC), ACM, pp. 387-394, 1990.
    • (1990) 22nd ACM Symposium on Theory of Computing (STOC) , pp. 387-394
    • Rompel, J.1
  • 18
    • 84947798969 scopus 로고    scopus 로고
    • Notions of reducibility between cryptographic primitives
    • LNCS, Springer-Verlag
    • O. Reingold, L. Trevisan, and S. Vadhan. Notions of Reducibility Between Cryptographic Primitives. In 1st Theory of Cryptography Conference, LNCS vol. 2951, Springer-Verlag, pp. 1-20, 2004.
    • (2004) 1st Theory of Cryptography Conference , vol.2951 , pp. 1-20
    • Reingold, O.1    Trevisan, L.2    Vadhan, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.