메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 124-128

Identity-based threshold signature scheme from the bilinear pairings (extended abstract)

Author keywords

Bilinear Pairing; Chosen message attack; Generalized Bilinear Problem; Identity based threshold signature; Verifiable secret sharing

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; ELECTRONIC MAIL; INVERSE PROBLEMS; SECURITY OF DATA; SERVERS;

EID: 3042597451     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (98)

References (15)
  • 1
    • 33646832774 scopus 로고    scopus 로고
    • Identity-based threshold decryption
    • to appear in
    • J. Baek and, Y. Zheng, "Identity-Based Threshold Decryption", to appear in Proc. of PKC 2004.
    • (2004) Proc. of PKC
    • Baek, J.1    Zheng, Y.2
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols", Proc. of the First ACM CCCS, pp 62-73, ACM Press, 1993.
    • (1993) Proc. of the First ACM CCCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Proc. of CRYPTO 2001, Springer-Verlag
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing", Proc. of CRYPTO 2001, LNCS 2139, pp 213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 0027580298 scopus 로고
    • Efficient and secure multiparty generation of digital signatures based on discrete logarithms
    • 1IEICE
    • M. Cerecedo, M. Matsumoto and H. Imai, "Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms", IEICE Trans. Fundamentals., Vol. E76-A, pp 532-545,1IEICE, 1993.
    • (1993) IEICE Trans. Fundamentals , vol.E76-A , pp. 532-545
    • Cerecedo, M.1    Matsumoto, M.2    Imai, H.3
  • 6
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap diffie-hellman groups
    • Proc. of PKC 2003, Springer-Verlag
    • J. Cha and J. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups", Proc. of PKC 2003, LNCS 2567, pp 18-30, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.1    Cheon, J.2
  • 7
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • IEEE
    • P. Feldman, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing", Proc. of the FOCS, pp 427-437, IEEE, 1987.
    • (1987) Proc. of the FOCS , pp. 427-437
    • Feldman, P.1
  • 8
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Proc. of EUROCRYPT '96, Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, "Robust Threshold DSS Signatures", Proc. of EUROCRYPT '96, LNCS 1070, pp 354-371, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1070 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 9
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystem
    • Proc. of EUROCRYPT '99, Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, "Secure Distributed Key Generation for Discrete-Log Based Cryptosystem", Proc. of EUROCRYPT '99, LNCS 1592, pp 295-310, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 10
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM Journal on Computing, 17, 2, pp 281-308, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 11
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Proc. of SAC 2002, Springer-Verlag
    • F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings", Proc. of SAC 2002, LNCS 2595, pp 310-324, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 12
    • 84958550160 scopus 로고    scopus 로고
    • The weil and tate pairings as building blocks for public key cryptosystems
    • Proc. of ANTS-V, Springer-Verlag
    • A. Joux, "The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems", Proc. of ANTS-V, LNCS 2369, pp 20-32, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2369 , pp. 20-32
    • Joux, A.1
  • 13
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Proc. of EUROCRYPT '91, Springer-Verlag
    • T. P. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing", Proc. of EUROCRYPT '91, LNCS 576, pp 129-140, Springer-Verlag,1992.
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret", Communications of the ACM, Vol. 22, pp 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 15
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Proc. of CRYPTO '84, Springer-Verlag
    • A. Shamir, "Identity-based Cryptosystems and Signature Schemes", Proc. of CRYPTO '84, LNCS 196, pp 47-53, Springer-Verlag, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.