메뉴 건너뛰기




Volumn 2612, Issue , 2003, Pages 355-372

Two efficient and provably secure schemes for server-assisted threshold signatures

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MODULAR CONSTRUCTION; NETWORK SECURITY; SMART CARDS;

EID: 26844502785     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36563-x_25     Document Type: Article
Times cited : (15)

References (38)
  • 3
    • 0001229355 scopus 로고    scopus 로고
    • A Forward-Secure Digital Signature Scheme
    • M. Bellare and S. Miner. A Forward-Secure Digital Signature Scheme. Crypto'99.
    • Crypto'99
    • Bellare, M.1    Miner, S.2
  • 5
    • 0000090958 scopus 로고    scopus 로고
    • The exact security of digital signatures: How to sign with RSA and Rabin
    • M. Bellare and P. Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. Eurocrypt'96.
    • Eurocrypt'96
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0000556454 scopus 로고    scopus 로고
    • Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attack
    • S. Bellovin and M. Merritt. Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attack. IEEE Security and Privacy'92.
    • IEEE Security and Privacy'92
    • Bellovin, S.1    Merritt, M.2
  • 8
    • 85084163661 scopus 로고    scopus 로고
    • A Method for Fast Revocation of Public Key Certificates and Security Capabilities
    • D. Boneh, X. Ding, G. Tsudik, and C. Wong. A Method for Fast Revocation of Public Key Certificates and Security Capabilities. Usenix Security'01.
    • Usenix Security'01
    • Boneh, D.1    Ding, X.2    Tsudik, G.3    Wong, C.4
  • 9
    • 0002181960 scopus 로고
    • Digital Multisignatures
    • C. Boyd. Digital Multisignatures. Cryptography and Coding, pp 241-246, 1989.
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 10
    • 28144462281 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. IEEE FOCS'01.
    • IEEE FOCS'01
    • Canetti, R.1
  • 12
    • 84957023370 scopus 로고    scopus 로고
    • Strong Key-Insulated Signature Schemes
    • to appear
    • Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong Key-Insulated Signature Schemes. PKC'03, to appear.
    • PKC'03
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 13
    • 0000613666 scopus 로고    scopus 로고
    • A Practical Scheme for Non-Interactive Verifiable Secret Sharing
    • P. Feldman. A Practical Scheme for Non-Interactive Verifiable Secret Sharing. IEEE FOGS'87.
    • IEEE FOGS'87
    • Feldman, P.1
  • 15
    • 35248872821 scopus 로고    scopus 로고
    • Yaksha: Augmenting Kerberos with Public Key Cryptography
    • R. Ganesan. Yaksha: Augmenting Kerberos with Public Key Cryptography. NDSS'95.
    • NDSS'95
    • Ganesan, R.1
  • 17
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks. SIAM J. Comput., (17)2, 1988, pp 281-308.
    • (1988) SIAM J. Comput. , vol.2 , Issue.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 20
    • 0037885445 scopus 로고    scopus 로고
    • Forward-Secure Signatures with Optimal Signing and Verifying
    • G. Itkis and L. Reyzin. Forward-Secure Signatures with Optimal Signing and Verifying. Crypto'01.
    • Crypto'01
    • Itkis, G.1    Reyzin, L.2
  • 21
    • 84871980827 scopus 로고    scopus 로고
    • SiBIR: Signer-Base Intrusion-Resilient Signatures
    • G. Itkis and L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. Crypto'02.
    • Crypto'02
    • Itkis, G.1    Reyzin, L.2
  • 22
    • 35248874661 scopus 로고    scopus 로고
    • Password Authentication using Multiple Servers
    • D. Jablon. Password Authentication using Multiple Servers. RSA-CT'01.
    • RSA-CT'01
    • Jablon, D.1
  • 23
    • 84880882264 scopus 로고    scopus 로고
    • Practical Password-Authenticated Key Exchange Provably Secure under Standard Assumptions
    • J. Katz, R. Ostrovsky, and M. Yung. Practical Password-Authenticated Key Exchange Provably Secure under Standard Assumptions. Eurocrypt'01.
    • Eurocrypt'01
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 24
    • 85088332284 scopus 로고    scopus 로고
    • Simple Forward-Secure Signatures from any Signature Schemes
    • H. Krawczyk. Simple Forward-Secure Signatures from any Signature Schemes. ACM CCS'00.
    • ACM CCS'00
    • Krawczyk, H.1
  • 26
  • 28
    • 0000845043 scopus 로고    scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • T. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. Crypto'91.
    • Crypto'91
    • Pedersen, T.1
  • 29
    • 33645748660 scopus 로고    scopus 로고
    • Secure Password-based Protocol for Downloading a Private Key
    • R. Perlman and C. Kaufman. Secure Password-based Protocol for Downloading a Private Key. NDSS'99.
    • NDSS'99
    • Perlman, R.1    Kaufman, C.2
  • 30
    • 0342779118 scopus 로고    scopus 로고
    • A Simplified Approach to Threshold and Proactive RSA
    • T. Rabin. A Simplified Approach to Threshold and Proactive RSA. Crypto'98.
    • Crypto'98
    • Rabin, T.1
  • 31
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. A. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. C. ACM. (21)2, 1978, pp 120-126.
    • (1978) C. ACM , vol.2 , Issue.21 , pp. 120-126
    • Rivest, R.A.1    Shamir, A.2    Adleman, L.3
  • 32
    • 33847249887 scopus 로고    scopus 로고
    • Password-Enabled PKI: Virtual Smart-cards versus Virtual Soft Tokens
    • R. Sandhu, M. Bellare, and Ravi Ganesan. Password-Enabled PKI: Virtual Smart-cards versus Virtual Soft Tokens. PKI Research Workshop. 2002.
    • (2002) PKI Research Workshop
    • Sandhu, R.1    Bellare, M.2    Ganesan, R.3
  • 33
    • 12344258539 scopus 로고
    • Efficient Signature Generation by Smart Cards
    • C. P. Schnorr. Efficient Signature Generation by Smart Cards. J. Cryptology, 1991.
    • (1991) J. Cryptology
    • Schnorr, C.P.1
  • 34
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. C. ACM, 22(11):612-613, 1979.
    • (1979) C. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 35
    • 0001000209 scopus 로고    scopus 로고
    • Practical Threshold Signatures
    • V. Shoup. Practical Threshold Signatures. Eurocrypt'00.
    • Eurocrypt'00
    • Shoup, V.1
  • 37
    • 84957021432 scopus 로고    scopus 로고
    • On the Dark Side of Threshold Cryptography
    • S. Xu and M. Yung. On the Dark Side of Threshold Cryptography. Financial Crypto'02.
    • Financial Crypto'02
    • Xu, S.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.