메뉴 건너뛰기




Volumn , Issue , 2003, Pages

Proactive Two-Party Signatures for User Authentication

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 26444603424     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (37)
  • 3
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
    • Berlin, Springer-Verlag
    • M. Bellare and A. Palacio. GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In Advances in Cryptology—Crypto’02, volume 2442 of Lecture Notes in Computer Science, pages 162–177, Berlin, 2002. Springer-Verlag.
    • (2002) Advances in Cryptology—Crypto’02, volume 2442 of Lecture Notes in Computer Science , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 8
    • 0003030602 scopus 로고
    • Coin flipping by telephone
    • M. Blum. Coin flipping by telephone. In IEEE Spring COMPCOM, pages 133–137, 1982.
    • (1982) IEEE Spring COMPCOM , pp. 133-137
    • Blum, M.1
  • 10
    • 0002181960 scopus 로고
    • Digital multisignatures
    • Oxford University Press
    • C. Boyd. Digital multisignatures. In IMA Conference on Cryptography and Coding, pages 241–246. Oxford University Press, 1989.
    • (1989) IMA Conference on Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 15
    • 0003629991 scopus 로고
    • U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
    • FIPS 180-1. Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
    • (1995) Secure Hash Standard
  • 16
    • 0003508562 scopus 로고
    • U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA
    • FIPS 186. Digital Signature Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, 1994.
    • (1994) Digital Signature Standard
  • 19
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281–308, 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 25
    • 0035747336 scopus 로고    scopus 로고
    • Delegation of cryptographic servers for capture-resilient devices
    • ACM, Full version
    • P. MacKenzie and M. Reiter. Delegation of cryptographic servers for capture-resilient devices. In Eight ACM Conference on Computer and Communication Security, pages 10–19. ACM, 2001. Full version available at: ftp://dimacs.rutgers.edu/pub/dimacs/TechnicalReports/TechReports/2001/2001-37.ps.gz.
    • (2001) Eight ACM Conference on Computer and Communication Security , pp. 10-19
    • MacKenzie, P.1    Reiter, M.2
  • 30
    • 0000901529 scopus 로고    scopus 로고
    • Security Arguments for Digital Signatures and Blind Signatures
    • D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 13(3):361–396, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 32
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161–174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 33
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, TX, February USENIX
    • J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX, pages 191–202, Dallas, TX, February 1988. USENIX.
    • (1988) Proceedings of the Winter 1988 USENIX , pp. 191-202
    • Steiner, J. G.1    Neuman, B. C.2    Schiller, J. I.3
  • 34
    • 0019080452 scopus 로고
    • A modification of the RSA public-key encryption procedure
    • November
    • H. C. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, IT-26(6):726–729, November 1980.
    • (1980) IEEE Transactions on Information Theory , vol.IT-26 , Issue.6 , pp. 726-729
    • Williams, H. C.1
  • 37
    • 85084164692 scopus 로고    scopus 로고
    • SSH – secure login connections over the Internet
    • San Jose, CA, July
    • T. Ylönen. SSH – secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37–42, San Jose, CA, July 1996.
    • (1996) Proceedings of the 6th USENIX Security Symposium , pp. 37-42
    • Ylönen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.