메뉴 건너뛰기




Volumn 7, Issue 1, 2004, Pages 1-20

Verifiable encryption of digital signatures and applications

Author keywords

Certified e mail; Contract signing; Digital signatures; Fair exchange; Proof of knowledge; Public key cryptography

Indexed keywords

CERTIFIED E-MAIL; CONTRACT SIGNING; FAIR EXCHANGE; PROOF OF KNOWLEDGE; TRUSTED THIRD PARTY (TTP);

EID: 3142585398     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/984334.984335     Document Type: Article
Times cited : (86)

References (35)
  • 3
    • 0033750375 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • ASOKAN, N., SHOUP, V., AND WAIDNER, M. 1998b. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications 18, 4, 593-610, 2000. Extended abstract in Advances in Cryptology - EUROCRYPT'98. Lecture Notes in Computer Science, vol. 1403. Springer-Verlag, Berlin, 591-606.
    • (1998) IEEE Journal on Selected Areas in Communications , vol.18 , Issue.4 , pp. 593-610
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 4
    • 0033750375 scopus 로고    scopus 로고
    • Extended abstract in. Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • ASOKAN, N., SHOUP, V., AND WAIDNER, M. 1998b. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications 18, 4, 593-610, 2000. Extended abstract in Advances in Cryptology - EUROCRYPT'98. Lecture Notes in Computer Science, vol. 1403. Springer-Verlag, Berlin, 591-606.
    • (2000) Advances in Cryptology - EUROCRYPT'98 , vol.1403 , pp. 591-606
  • 7
    • 3142653735 scopus 로고    scopus 로고
    • Stateless-recipient certified e-mail system based on verifiable encryption
    • San Jose, CA, USA, Feb. 19-22
    • ATENIESE, G. AND NITA-ROTARU, C. 2002. Stateless-recipient certified e-mail system based on verifiable encryption. In RSA 2002, McEnery Convention Center (San Jose, CA, USA, Feb. 19-22).
    • (2002) RSA 2002, McEnery Convention Center
    • Ateniese, G.1    Nita-Rotaru, C.2
  • 9
    • 0031682832 scopus 로고    scopus 로고
    • Efficient and practical fair exchange protocols with off-line TTP
    • Oakland, CA
    • BAO, F., DENG, R. H., AND MAO, W. 1998. Efficient and practical fair exchange protocols with off-line TTP. In IEEE Symposium on Security and Privacy (Oakland, CA).
    • (1998) IEEE Symposium on Security and Privacy
    • Bao, F.1    Deng, R.H.2    Mao, W.3
  • 12
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • BONEH, D. 1998. The decision Diffie-Hellman problem. In Algorithmic Number Theory (ANTS-III). Lecture Notes in Computer Science, vol. 1423. Springer-Verlag, Berlin, 48-63.
    • (1998) Algorithmic Number Theory (ANTS-III) , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 13
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
    • Lecture Notes in Computer Science, vol. 1976. Springer-Verlag, Berlin
    • CAMENISCH, J. AND DAMGARD, I. B. 2000. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In Advances in Cryptology - ASIACRYPT'00. Lecture Notes in Computer Science, vol. 1976. Springer-Verlag, Berlin, 331-345.
    • (2000) Advances in Cryptology - ASIACRYPT'00 , pp. 331-345
    • Camenisch, J.1    Damgard, I.B.2
  • 14
    • 84947809553 scopus 로고    scopus 로고
    • A group signature scheme with improved efficiency
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • CAMENISCH, J. AND MICHELS, M. 1998a. A group signature scheme with improved efficiency. In Advances in Cryptology - ASIACRYPT'98. Lecture Notes in Computer Science, vol. 1514. Springer-Verlag, Berlin, 160-174.
    • (1998) Advances in Cryptology - ASIACRYPT'98 , vol.1514 , pp. 160-174
    • Camenisch, J.1    Michels, M.2
  • 15
    • 0141945482 scopus 로고    scopus 로고
    • A group signature scheme based on an RSA-variant
    • BRICS, Aarhus. An earlier version appears in Camenisch and Michels [1998]
    • CAMENISCH, J. AND MICHELS, M. 1998b. A Group Signature Scheme Based on an RSA-Variant. Technical Report RS-98-27, BRICS, Aarhus. An earlier version appears in Camenisch and Michels [1998].
    • (1998) Technical Report , vol.RS-98-27
    • Camenisch, J.1    Michels, M.2
  • 16
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • CAMENISCH, J. AND MICHELS, M. 1999a. Proving in zero-knowledge that a number is the product of two safe primes. In Advances in Cryptology - EUROCRYPT'99. Lecture Notes in Computer Science. Springer-Verlag, Berlin.
    • (1999) Advances in Cryptology - EUROCRYPT'99
    • Camenisch, J.1    Michels, M.2
  • 18
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - Easy go divisible cash
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin. Updated and corrected version available as GTE Technical Report
    • CHAN, A., FRANKEL, Y., AND TSIOUNIS, Y. 1998. Easy come - easy go divisible cash. In Advances in Cryptology - EUROCRYPT'98. Lecture Notes in Computer Science, vol. 1403. Springer-Verlag, Berlin, 561-575. Updated and corrected version available as GTE Technical Report.
    • (1998) Advances in Cryptology - EUROCRYPT'98 , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 22
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • EVEN, S., GOLDREICH, O., AND LEMPEL, A. 1985. A randomized protocol for signing contracts. Communications of the ACM 28, 6, 637-647.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 23
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Lecture Notes in Computer Science, vol. 263. Springer-Verlag, Berlin
    • FIAT, A. AND SHAMIR, A. 1987. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology - CRYPTO'86. Lecture Notes in Computer Science, vol. 263. Springer-Verlag, Berlin, 186-194.
    • (1987) Advances in Cryptology - CRYPTO'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 24
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • FUJISAKI, E. AND OKAMOTO, T. 1997. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology - CRYPTO'97. Lecture Notes in Computer Science, vol. 1294. Springer-Verlag, Berlin, 16-30.
    • (1997) Advances in Cryptology - CRYPTO'97 , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 25
    • 84957661041 scopus 로고    scopus 로고
    • Secure signatures, without trees or random oracles
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • GENNARO, R., HALEVI, S., AND RABIN, T. 1999. Secure signatures, without trees or random oracles. In Advances in Cryptology - EUROCRYPT'99. Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, Berlin, 123-139
    • (1999) Advances in Cryptology - EUROCRYPT'99 , vol.1592 , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 26
    • 84947558992 scopus 로고
    • A paradoxical identity-based signature scheme resulting from zero-knowledge
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • GUILLOU, L. C. AND QUISQUATER, J. J. 1988. A paradoxical identity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology - CRYPTO'88. Lecture Notes in Computer Science, vol. 403. Springer-Verlag, Berlin, 216-231.
    • (1988) Advances in Cryptology - CRYPTO'88 , vol.403 , pp. 216-231
    • Guillou, L.C.1    Quisquater, J.J.2
  • 28
    • 24944538962 scopus 로고    scopus 로고
    • Certified e-mail with invisible post offices
    • MICALI, S. 1997. Certified e-mail with invisible post offices. Presented at the 1997 RSA Security Conference.
    • (1997) 1997 RSA Security Conference
    • Micali, S.1
  • 30
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • OKAMOTO, T. AND UCHIYAMA, S. 1998. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology - EUROCRYPT'98. Lecture Notes in Computer Science, vol. 1403. Springer-Verlag, Berlin, 308-318.
    • (1998) Advances in Cryptology - EUROCRYPT'98 , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 31
    • 84957640282 scopus 로고    scopus 로고
    • Security analysis of a practical "on the fly" authentication and signature generation
    • Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • POUPARD, G. AND STERN, J. 1998. Security analysis of a practical "on the fly" authentication and signature generation. In Advances in Cryptology - EUROCRYPT'98. Lecture Notes in Computer Science, vol. 1403. Springer-Verlag, Berlin, 422-436.
    • (1998) Advances in Cryptology - EUROCRYPT'98 , vol.1403 , pp. 422-436
    • Poupard, G.1    Stern, J.2
  • 33
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2, 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 34
    • 12344258539 scopus 로고
    • Efficient signature generation by smart-cards
    • SCHNORR, C. P. 1991. Efficient signature generation by smart-cards. Journal of Cryptology 4, 3, 161-174.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.