메뉴 건너뛰기




Volumn 19, Issue 2, 2006, Pages 169-209

Strengthening zero-knowledge protocols using signatures

Author keywords

Non malleability; Signatures; Simulation soundness; Zero knowledge

Indexed keywords

COMPUTER SIMULATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; THEOREM PROVING;

EID: 32844472758     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-005-0307-3     Document Type: Article
Times cited : (49)

References (58)
  • 2
    • 0036949106 scopus 로고    scopus 로고
    • Constant-round coin-tossing with a man in the middle or realizing the shared random string model
    • B. Barak. Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In Proc. 43rd IEEE Symp. on Foundations of Computer Science, pp. 345-355, 2002
    • (2002) Proc. 43rd IEEE Symp. on Foundations of Computer Science , pp. 345-355
    • Barak, B.1
  • 4
    • 84957360970 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • LNCS 1233
    • N. Barić and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - EUROCRYPT'97 (LNCS 1233), pp. 480-494, 1997.
    • (1997) Advances in Cryptology - EUROCRYPT'97 , pp. 480-494
    • Barić, N.1    Pfitzmann, B.2
  • 7
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • LNCS 1807
    • F. Boudot. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology - EUROCRYPT 2000 (LNCS 1807), pp. 431-444, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 431-444
    • Boudot, F.1
  • 9
    • 84921060028 scopus 로고    scopus 로고
    • Separability and efficiency for generic group signature schemes
    • LNCS 1666
    • J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In Advances in Cryptology - CRYPTO'99 (LNCS 1666), pages 414-430, 1999.
    • (1999) Advances in Cryptology - CRYPTO'99 , pp. 414-430
    • Camenisch, J.1    Michels, M.2
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: a new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symp. on Foundations of Computer Science, pp. 136-145, 2001.
    • (2001) Proc. 42nd IEEE Symp. on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 13
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party computation
    • Full version in ePrint archive, Report 2002/140
    • R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party computation. In Proc. 34th ACM Symp. on Theory of Computing, pp. 494-503, 2002. Full version in ePrint archive, Report 2002/140. http://eprint.iacr.org/, 2002.
    • (2002) Proc. 34th ACM Symp. on Theory of Computing , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 16
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • LNCS 839
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology - CRYPTO'94 (LNCS 839), pages 174-187, 1994.
    • (1994) Advances in Cryptology - CRYPTO'94 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 17
    • 85024261619 scopus 로고    scopus 로고
    • Signature scheme based on the strong RSA assumption
    • R. Cramer and V. Shoup. Signature scheme based on the strong RSA assumption. In ACM Trans. Inform. Syst. Security 3(3):161-185, 2000.
    • (2000) ACM Trans. Inform. Syst. Security , vol.3 , Issue.3 , pp. 161-185
    • Cramer, R.1    Shoup, V.2
  • 18
    • 84948970500 scopus 로고    scopus 로고
    • Efficient concurrent zero-knowledge in the auxiliary string model
    • LNCS 1807
    • I. Damgård. Efficient concurrent zero-knowledge in the auxiliary string model. In Advances in Cryptology - EUROCRYPT 2000 (LNCS 1807), pp. 418-430, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 418-430
    • Damgård, I.1
  • 19
    • 84937437506 scopus 로고    scopus 로고
    • Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
    • (LNCS 2442), Full version in ePrint Archive, Report 2001/091
    • I. Damgård and J. Nielsen. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In Advances in Cryptology - CRYPTO 2002 (LNCS 2442), pp. 581-596, 2002. Full version in ePrint Archive, Report 2001/091. http://eprint.iacr.org/, 2001.
    • (2002) Advances in Cryptology - CRYPTO 2002 , pp. 581-596
    • Damgård, I.1    Nielsen, J.2
  • 22
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable cryptography
    • D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM J. Comput., 30(2):391-437, 2000.
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 25
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31:469-472, 1985.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 26
    • 0003157491 scopus 로고    scopus 로고
    • On-line/off-line digital signatures
    • S. Even, O. Goldreich, and S. Micali. On-line/off-line digital signatures. J. Cryptology, 9(1):35-67 (1996).
    • (1996) J. Cryptology , vol.9 , Issue.1 , pp. 35-67
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 28
    • 0003629991 scopus 로고
    • FIPS 180-1. Federal Information Processing Standards Publication 180-1, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia
    • FIPS 180-1. Secure hash standard. Federal Information Processing Standards Publication 180-1, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia, 1995.
    • (1995) Secure Hash Standard
  • 29
    • 0003508564 scopus 로고
    • FIPS 186. Federal Information Processing Standards Publication 186, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia
    • FIPS 186. Digital signature standard. Federal Information Processing Standards Publication 186, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia, 1994.
    • (1994) Digital Signature Standard
  • 30
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • LNCS 1294
    • E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology - CRYPTO'97 (LNCS 1294), pp. 16-30, 1997.
    • (1997) Advances in Cryptology - CRYPTO'97 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 31
    • 84957661041 scopus 로고    scopus 로고
    • Secure hash-and-sign signatures without the random oracle
    • LNCS 1592
    • R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. In Advances in Cryptology - EUROCRYPT'99 (LNCS 1592), pp. 123-139, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT'99 , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 32
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero knowledge proof systems
    • O. Goldreich and H. Krawczyk. On the composition of zero knowledge proof systems. SIAM J. Comput., 25(1):169-192, 1996.
    • (1996) SIAM J. Comput. , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 33
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proc. 19th ACM Symp. on Theory of Computing, pp. 218-229, 1987.
    • (1987) Proc. 19th ACM Symp. on Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 34
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or All languages in NP have zero-knowledge proof systems. J. ACM, 38(3):691-729, 1991.
    • (1991) J. ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 35
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • February
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186-208, February 1989.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 36
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17:281-308, 1988.
    • (1988) SIAM J. Comput. , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 37
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory
    • LNCS 330
    • L. C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory. In Advances in Cryptology - EUROCRYPT'88 (LNCS 330), pp. 123-128, 1988
    • (1988) Advances in Cryptology - EUROCRYPT'88 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 38
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
    • LNCS 1807
    • S. Jarecki and A. Lysyanskaya. Adaptively secure threshold cryptography: introducing concurrency, removing erasures. In Advances in Cryptology - EUROCRYPT 2000 (LNCS 1807), pp. 221-242, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 221-242
    • Jarecki, S.1    Lysyanskaya, A.2
  • 40
    • 35248878052 scopus 로고    scopus 로고
    • Efficient and non-malleable proofs of plaintext knowledge and applications
    • LNCS 2656
    • J. Katz. Efficient and non-malleable proofs of plaintext knowledge and applications. In Advances in Cryptology - EUROCRYPT 2003 (LNCS 2656), pp. 211-228, 2003.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , pp. 211-228
    • Katz, J.1
  • 41
    • 0034830278 scopus 로고    scopus 로고
    • Concurrent and resettable zero-knowledge in poly-logarithmic rounds
    • J. Kilian and E. Petrank. Concurrent and resettable zero-knowledge in poly-logarithmic rounds. In Proc. 33rd ACM Symp. on Theory of Computing, pp. 560-569, 2001.
    • (2001) Proc. 33rd ACM Symp. on Theory of Computing , pp. 560-569
    • Kilian, J.1    Petrank, E.2
  • 44
    • 0000202647 scopus 로고    scopus 로고
    • In Russian. Engl. trans.
    • In Russian. Engl. trans.: Probl. Inform. Transm. 9:265-266.
    • Probl. Inform. Transm. , vol.9 , pp. 265-266
  • 48
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In Proc. 22nd ACM Symp. on Theory of Computing, pp. 427-437, 1990.
    • (1990) Proc. 22nd ACM Symp. on Theory of Computing , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 49
    • 0001412930 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • LNCS 1403
    • T. Okamolo and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology - EUROCRYPT'98 (LNCS 1403), pp. 380-318, 1998.
    • (1998) Advances in Cryptology - EUROCRYPT'98 , pp. 380-1318
    • Okamolo, T.1    Uchiyama, S.2
  • 50
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residue classes
    • LNCS 1592
    • P. Paillier. Public-key cryptosystems based on composite degree residue classes. In Advances in Cryptology - EUROCRYPT'99 (LNCS 1592), pp. 223-238, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT'99 , pp. 223-238
    • Paillier, P.1
  • 51
    • 84982943258 scopus 로고
    • Non-interactive and informalion-theoretic secure verifiable secret sharing
    • LNCS 576
    • T. P. Pedersen. Non-interactive and informalion-theoretic secure verifiable secret sharing. In Advances in Cryptology - CRYPTO'91 (LNCS 576), pp. 129-140, 1991.
    • (1991) Advances in Cryptology - CRYPTO'91 , pp. 129-140
    • Pedersen, T.P.1
  • 52
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. J. Cryptology, 13(3):361-396, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 56
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proc. 22nd ACM Symp. on Theory of Computing, pp. 387-394, 1990.
    • (1990) Proc. 22nd ACM Symp. on Theory of Computing , pp. 387-394
    • Rompel, J.1
  • 57
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • A. Sahai. Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In Proc. 40th IEEE Symp. on Foundations of Computer Science, pp. 543-553, 1999.
    • (1999) Proc. 40th IEEE Symp. on Foundations of Computer Science , pp. 543-553
    • Sahai, A.1
  • 58
    • 85032873931 scopus 로고
    • Efficient identification and signatures for smart cards
    • LNCS 434
    • C. P. Schnorr. Efficient identification and signatures for smart cards. In Advances in Cryptology - EUROCRYPT'89 (LNCS 434), pp. 688-689, 1989.
    • (1989) Advances in Cryptology - EUROCRYPT'89 , pp. 688-689
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.