메뉴 건너뛰기




Volumn , Issue , 2005, Pages 815-824

Distributed blinding for distributed ElGamal re-encryption

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; CRYPTOGRAPHY; NETWORK PROTOCOLS; SERVERS; TELECOMMUNICATION SERVICES; ELECTRONIC PUBLISHING;

EID: 27644532597     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (37)
  • 2
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • American Federation of Information Processing Societies Proceedings
    • G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference, 48, pages 313-317. American Federation of Information Processing Societies Proceedings, 1979.
    • (1979) Proceedings of the National Computer Conference , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 4
    • 0002181960 scopus 로고
    • Digital multisignatures
    • H. Baker and F. Piper, editors, Clarendon Press
    • C. Boyd. Digital multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241-246. Clarendon Press, 1989.
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 5
    • 0035789226 scopus 로고    scopus 로고
    • Distributing trust on the Internet
    • Göteborg, Sweden, June 30-July 4. IEEE Computer Society Technical Committee on Fault-Tolerant Computing, IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance, IEEE Computer Society
    • C. Cachin. Distributing trust on the Internet. In Proceedings of International Conference on Dependable Systems and Networks (DSN-2001), pages 183-192, Göteborg, Sweden, June 30-July 4 2001. IEEE Computer Society Technical Committee on Fault-Tolerant Computing, IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance, IEEE Computer Society.
    • (2001) Proceedings of International Conference on Dependable Systems and Networks (DSN-2001) , pp. 183-192
    • Cachin, C.1
  • 10
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • E. F. Brickell, editor Santa Barbara, CA USA, August. Springer-Verlag
    • D. Chaum and T. Pedersen. Wallet databases with observers. In E. F. Brickell, editor. Advances in Cryptology - Crypto '92 (Lecture Notes in Computer Science 576), pages 89-105, Santa Barbara, CA USA, August 1992. Springer-Verlag.
    • (1992) Advances in Cryptology - Crypto '92 (Lecture Notes in Computer Science) , vol.576 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 13
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • G. Brassard, editor, Santa Barbara, California, U.S.A., August. Springer-Verlag
    • Y. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology - Crypto'89 (Lecture Notes in Computer Science 435), pages 307-315, Santa Barbara, California, U.S.A., August 1990. Springer-Verlag.
    • (1990) Advances in Cryptology - Crypto'89 (Lecture Notes in Computer Science) , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 14
    • 0038061165 scopus 로고    scopus 로고
    • Redistributing secret shares to new access structures and its applications
    • George Mason University, July
    • Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its applications. Technical Report ISSE-TR-97-01, George Mason University, July 1997.
    • (1997) Technical Report , vol.ISSE-TR-97-01
    • Desmedt, Y.1    Jajodia, S.2
  • 16
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 18
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty processor
    • April
    • M. J. Fischer, N. A. Lynch, and M. S. Peterson. Impossibility of distributed consensus with one faulty processor. Journal of the ACM, 32(2):374-382, April 1985.
    • (1985) Journal of the ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Peterson, M.S.3
  • 20
    • 27944455141 scopus 로고    scopus 로고
    • Cryptosystems robust against "dynamic faults" meet enterprise needs for organizational "change control"
    • M. K. Franklin, editor, Anguilla, British West Indies, Feb. Springer-Verlag
    • Y. Frankel and M. Yung. Cryptosystems robust against "dynamic faults" meet enterprise needs for organizational "change control". In M. K. Franklin, editor, Proceedings of the Third International Conference on Financial Cryptography, FC'99 (Lecture Notes in Computer Science 1648), pages 241-252, Anguilla, British West Indies, Feb 1999. Springer-Verlag.
    • (1999) Proceedings of the Third International Conference on Financial Cryptography, FC'99 (Lecture Notes in Computer Science) , vol.1648 , pp. 241-252
    • Frankel, Y.1    Yung, M.2
  • 22
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • D. Coppersmith, editor, Santa Barbara, California, U.S.A., August. Springer-Verlag
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. In D. Coppersmith, editor, Advances in Cryptology - Crypto'95 (Lecture Notes in Computer Science 963), pages 457-469, Santa Barbara, California, U.S.A., August 1995. Springer-Verlag.
    • (1995) Advances in Cryptology - Crypto'95 (Lecture Notes in Computer Science) , vol.963 , pp. 457-469
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 23
    • 84956869808 scopus 로고    scopus 로고
    • On quorum controlled asymmetric proxy re-encryption
    • H. Imai and Y. Zheng, editors, Public Key Cryptography, Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), Berlin, Germany. Springer-Verlag
    • M. Jakobsson. On quorum controlled asymmetric proxy re-encryption. In H. Imai and Y. Zheng, editors, Public Key Cryptography, Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), volume 1560 of Lecture Notes in Computer Science, pages 112-121, Berlin, Germany, 1999. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1560 , pp. 112-121
    • Jakobsson, M.1
  • 26
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystem: Delegation of the power to decrypt ciphertexts
    • January
    • M. Mambo and E. Olamoto. Proxy cryptosystem: Delegation of the power to decrypt ciphertexts. IEICE TRANS. Fundamentals, E80-A(1):54-63, January 1997.
    • (1997) IEICE TRANS. Fundamentals , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Olamoto, E.2
  • 29
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. J. ACM, 27(2):228-234, 1980.
    • (1980) J. ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 30
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum, editor, Santa Barbara, California, U.S.A., August. Springer-Verlag
    • T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor. Advances in Cryptology - Crypto'91 (Lecture Notes in Computer Science 576), pages 129-140, Santa Barbara, California, U.S.A., August 1992. Springer-Verlag.
    • (1992) Advances in Cryptology - Crypto'91 (Lecture Notes in Computer Science) , vol.576 , pp. 129-140
    • Pedersen, T.1
  • 31
    • 0030126124 scopus 로고    scopus 로고
    • Distributing trust with the Rampart toolkit
    • April
    • M. K. Reiter. Distributing trust with the Rampart toolkit. Communications of the ACM, 39(4):71-74, April 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.4 , pp. 71-74
    • Reiter, M.K.1
  • 33
    • 26044481272 scopus 로고    scopus 로고
    • Distributed trust: Supporting fault-tolerance and attack-tolerance
    • Computer Science Department, Cornell University, Ithaca, NY USA, January
    • F. B. Schneider and L. Zhou. Distributed trust: Supporting fault-tolerance and attack-tolerance. Technical Report TR 2004-1924, Computer Science Department, Cornell University, Ithaca, NY USA, January 2004.
    • (2004) Technical Report , vol.TR 2004-1924
    • Schneider, F.B.1    Zhou, L.2
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 36
    • 12344290414 scopus 로고    scopus 로고
    • Distributed blinding for ElGamal re-encryption
    • Cornell University, January
    • L. Zhou, M. A. Marsh, F. B. Schneider, and A. Redz. Distributed blinding for ElGamal re-encryption. Technical Report TR 2004-1920, Cornell University, January 2004.
    • (2004) Technical Report , vol.TR 2004-1920
    • Zhou, L.1    Marsh, M.A.2    Schneider, F.B.3    Redz, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.