메뉴 건너뛰기




Volumn 8, Issue 3, 2005, Pages 259-286

APSS: Proactive secret sharing in asynchronous systems

Author keywords

Asynchronous system; Denial of service; Proactive secret sharing; Threshold cryptography

Indexed keywords

ASYNCRONOUS SYSTEMS; DENIAL OF SERVICE; PROACTIVE SECRET SHARING; THRESHOLD CRYPTOGRAPHY;

EID: 27644508954     PISSN: 10949224     EISSN: 10949224     Source Type: Journal    
DOI: 10.1145/1085126.1085127     Document Type: Article
Times cited : (91)

References (36)
  • 1
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • American Federation of Information Processing Societies Proceedings
    • BLAKLEY, G. R. 1979. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference, 48. American Federation of Information Processing Societies Proceedings, 313-317.
    • (1979) Proceedings of the National Computer Conference , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 2
    • 0002181960 scopus 로고
    • Digital multisignatures
    • H. Baker and F. Piper, Eds. Clarendon Press
    • BOYD, C. 1989. Digital multisignatures. In Cryptography and Coding, H. Baker and F. Piper, Eds. Clarendon Press, pp. 241-246.
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 5
    • 84880899710 scopus 로고    scopus 로고
    • Secure and efficient asynchronous broadcast protocols
    • J. Kilian, Ed. Lecture Notes in Computer Science. Springer-Verlag
    • CACHIN, C., KURSAWE, K., PETZOLD, F., AND SHOUP, V. 2001. Secure and efficient asynchronous broadcast protocols (extended abstract). In Advances in Cryptology - Crypto'2001, J. Kilian, Ed. Lecture Notes in Computer Science, vol. 2139. Springer-Verlag, 524-541.
    • (2001) Advances in Cryptology - Crypto'2001 , vol.2139 , pp. 524-541
    • Cachin, C.1    Kursawe, K.2    Petzold, F.3    Shoup, V.4
  • 6
    • 0342880858 scopus 로고
    • PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel (June)
    • CANETTI, R. 1995. Studies in Secure Multiparty Computation and Applications. PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel (June).
    • (1995) Studies in Secure Multiparty Computation and Applications
    • Canetti, R.1
  • 9
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance and proactive recovery
    • CASTRO, M. AND LISKOV, B. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 4 (Nov.), 398-461.
    • (2002) ACM Trans. Comput. Syst. , vol.20 , Issue.4 NOV , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 11
    • 84976713553 scopus 로고
    • Concurrent control with readers and writers
    • COURTOIS, P., HEYMANS, F., AND PARNAS, D. 1971. Concurrent control with readers and writers. Communications of the ACM 14, 10 (Oct.), 667-668.
    • (1971) Communications of the ACM , vol.14 , Issue.10 OCT , pp. 667-668
    • Courtois, P.1    Heymans, F.2    Parnas, D.3
  • 12
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • C. Pomerance, Ed. Advances in Cryptology - Crypto'87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA (Aug.) 16-20, 1987, Springer-Verlag
    • DESMEDT, Y. 1988. Society and group oriented cryptography: A new concept. In C. Pomerance, Ed. Advances in Cryptology - Crypto'87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA (Aug.) 16-20, 1987, Vol. 293 of Lecture Notes in Computer Science, Springer-Verlag, pp. 120-127.
    • (1988) Lecture Notes in Computer Science , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 13
    • 0038061165 scopus 로고    scopus 로고
    • Redistributing secret shares to new access structures and its applications
    • George Mason University, July
    • DESMEDT, Y. AND JAJODIA, S. 1997. Redistributing secret shares to new access structures and its applications. Technical Report ISSE_TR-97-01, George Mason University, July.
    • (1997) Technical Report , vol.ISSE-TR-97-01
    • Desmedt, Y.1    Jajodia, S.2
  • 15
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty processor
    • FISCHER, M. J., LYNCH, N. A., AND PETERSON, M. S. 1985. Impossibility of distributed consensus with one faulty processor. Journal of the ACM 32, 2 (Apr.), 374-382.
    • (1985) Journal of the ACM , vol.32 , Issue.2 APR , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Peterson, M.S.3
  • 17
    • 84958676203 scopus 로고    scopus 로고
    • Proactive RSA
    • B. Kaliski, Ed. Lecture Notes in Computer Science Santa Barbara, California (Aug.). Springer-Verlag
    • FRANKEL, Y., GEMMELL, P., MACKENZIE, P., AND YUNG, M. 1997b. Proactive RSA. In Advances in Cryptology - Crypto'97, B. Kaliski, Ed. Lecture Notes in Computer Science vol. 1294, Santa Barbara, California (Aug.). Springer-Verlag, pp. 440-454.
    • (1997) Advances in Cryptology - Crypto'97 , vol.1294 , pp. 440-454
    • Frankel, Y.1    Gemmell, P.2    Mackenzie, P.3    Yung, M.4
  • 18
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • D. Coppersmith, Ed. Lecture Notes in Computer Science Santa Barbara, California (Aug.). Springer-Verlag
    • HERZBERG, A., JARECKI, S., KRAWCZYK, H., AND YUNG, M. 1995. Proactive secret sharing or: How to cope with perpetual leakage. In Advances in Cryptology - Crypto '95, D. Coppersmith, Ed. Lecture Notes in Computer Science vol. 963, Santa Barbara, California (Aug.). Springer-Verlag, 457-469.
    • (1995) Advances in Cryptology - Crypto '95 , vol.963 , pp. 457-469
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 20
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multi-party computation
    • HIRT, M. AND MAURER, U. 2000. Player simulation and general adversary structures in perfect multi-party computation. Journal of Cryptology 13, 1, 31-60.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 22
    • 0010316932 scopus 로고
    • Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (Sept.)
    • JARECKI, S. 1995. Proactive secret sharing and public key cryptosystems. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (Sept.).
    • (1995) Proactive Secret Sharing and Public Key Cryptosystems
    • Jarecki, S.1
  • 23
    • 0017555081 scopus 로고
    • Concurrent reading while writing
    • LAMPORT, L. 1977. Concurrent reading while writing. Communications of the ACM 20, 11, 806-811.
    • (1977) Communications of the ACM , vol.20 , Issue.11 , pp. 806-811
    • Lamport, L.1
  • 25
    • 0032306029 scopus 로고    scopus 로고
    • Byzantine quorum systems
    • MALKHI, D. AND REITER, M. 1998. Byzantine quorum systems. Distributed Computing 11, 4, 203-213.
    • (1998) Distributed Computing , vol.11 , Issue.4 , pp. 203-213
    • Malkhi, D.1    Reiter, M.2
  • 27
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum, Ed. Lecture Notes in Computer Science, Santa Barbara, California (Aug.). Springer-Verlag
    • PEDERSEN, T. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology - Crypto'91, J. Feigenbaum, Ed. Lecture Notes in Computer Science vol. 576, Santa Barbara, California (Aug.). Springer-Verlag, 129-140.
    • (1992) Advances in Cryptology - Crypto'91 , vol.576 , pp. 129-140
    • Pedersen, T.1
  • 28
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • H. Krawczyk Ed. Lecture Notes in Computer Science, Santa Barbara, California (Aug.). Springer-Verlag
    • RABIN, T. 1998. A simplified approach to threshold and proactive RSA. In Advances in Cryptology - Crypto'98, H. Krawczyk Ed. Lecture Notes in Computer Science vol. 1462, Santa Barbara, California (Aug.). Springer-Verlag, 89-104.
    • (1998) Advances in Cryptology - Crypto'98 , vol.1462 , pp. 89-104
    • Rabin, T.1
  • 29
    • 84948956297 scopus 로고
    • The Rampart toolkit for building high-integrity services
    • K. P. Birman, F. Mattern, and A. Schiper, Eds. Theory and Practice in Distributed Systems, International Workshop, Selected Papers, Berlin, Germany, Springer-Verlag
    • REITER, M. K. 1995. The Rampart toolkit for building high-integrity services. In K. P. Birman, F. Mattern, and A. Schiper, Eds. Theory and Practice in Distributed Systems, International Workshop, Selected Papers, Vol. 938 of Lecture Notes in Computer Science, Berlin, Germany, Springer-Verlag, 99-110.
    • (1995) Lecture Notes in Computer Science , vol.938 , pp. 99-110
    • Reiter, M.K.1
  • 30
    • 0030126124 scopus 로고    scopus 로고
    • Distributing trust with the Rampart toolkit
    • REITER, M. K. 1996. Distributing trust with the Rampart toolkit. Communications of the ACM 39, 4 (Apr.), 71-74.
    • (1996) Communications of the ACM , vol.39 , Issue.4 APR , pp. 71-74
    • Reiter, M.K.1
  • 31
    • 0003976812 scopus 로고
    • Understanding protocols for Byzantine clock synchronization
    • Computer Science Department, Cornell University, New York
    • SCHNEIDER, F. B. 1987. Understanding protocols for Byzantine clock synchronization. Technical Report TR 87-859, Computer Science Department, Cornell University, New York,
    • (1987) Technical Report , vol.TR 87-859
    • Schneider, F.B.1
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A. 1979. How to share a secret. Communications of the ACM 22, 11 (Nov.), 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 NOV , pp. 612-613
    • Shamir, A.1
  • 33
    • 33645459930 scopus 로고    scopus 로고
    • Verifiable secret redistribution for threshold sharing schemes
    • School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, February 2002
    • WONG, T. M., WANG, C., AND WING, J. M. 2002. Verifiable secret redistribution for threshold sharing schemes. Technical Report CMU-CS-02-114, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, February 2002.
    • (2002) Technical Report , vol.CMU-CS-02-114
    • Wong, T.M.1    Wang, C.2    Wing, J.M.3
  • 35
    • 0347764000 scopus 로고    scopus 로고
    • APSS: Proactive secret sharing in asynchronous systems
    • Computer Science Department (Oct.), Cornell University, Ithaca, New York
    • ZHOU, L., SCHNEIDER, F. B., AND VAN RENESSE, R. 2002a. APSS: Proactive secret sharing in asynchronous systems. Technical Report TR 2002-1877, Computer Science Department (Oct.), Cornell University, Ithaca, New York.
    • (2002) Technical Report , vol.TR 2002-1877
    • Zhou, L.1    Schneider, F.B.2    Van Renesse, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.