메뉴 건너뛰기




Volumn 149, Issue 2, 2006, Pages 409-443

Proving possession of arbitrary secrets while not giving them away: New protocols and a proof in gny logic

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33646480213     PISSN: 00397857     EISSN: 15730964     Source Type: Journal    
DOI: 10.1007/s11229-005-3879-4     Document Type: Conference Paper
Times cited : (1)

References (34)
  • 3
    • 0005314588 scopus 로고
    • Cryptographic hash functions: A Survey
    • Department of Computer Science. University of Wollongong
    • Bakhtiari, S., R. Safavi-Naini, and J. Pieprzyk: 1995, 'Cryptographic Hash Functions: A Survey', Technical Report 95-09, Department of Computer Science. University of Wollongong.
    • (1995) Technical Report , vol.95 , Issue.9
    • Bakhtiari, S.1    Safavi-Naini, R.2    Pieprzyk, J.3
  • 4
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • E. Brickell (ed.), Springer Verlag, Berlin
    • Bellare, M. and O. Goldreich: 1993. "On Defining Proofs of Knowledge', in E. Brickell (ed.), Advances in Cryptologv: Crypto '93 Proceedings, Vol. 740, Springer Verlag, Berlin, pp. 390-420.
    • (1993) Advances in Cryptologv: Crypto '93 Proceedings , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 5
    • 84954417747 scopus 로고
    • XOR MACs: New methods for message authentication using finite pseudorandom functions
    • D. Coppersmith (ed.). Springer Verlag. Berlin
    • Bellare, M., R. Guerin, and P. Rogaway: 1995, "XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions', in D. Coppersmith (ed.). Advances in Cryptologv: Crypto '95 Proceedings, Lecture Notes in Computer Science, Vol. 963. Springer Verlag. Berlin, pp. 15-28.
    • (1995) Advances in Cryptologv: Crypto '95 Proceedings, Lecture Notes in Computer Science , vol.963 , pp. 15-28
    • Bellare, M.1    Guerin, R.2    Rogaway, P.3
  • 7
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires' problem
    • Boudot, F., B. Schoenmakers. and I Traoré: 2001. "A Fair and Efficient Solution to the Socialist Millionaires' Problem'. Discrete Applied Mathematics 111(1-2). 23-36.
    • (2001) Discrete Applied Mathematics , vol.111 , Issue.1-2 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traoré, I.3
  • 10
    • 85028868533 scopus 로고
    • Collision free hash functions and public key signature schemes
    • D. Chaurn and W. Price (eds.). Springer Verlag, Berlin
    • Damgård. I.: 1988. "Collision Free Hash Functions and Public Key Signature Schemes', in D. Chaurn and W. Price (eds.). EUROCRYPT. Lecture Notes in Computer Science, Vol. 304. Springer Verlag, Berlin, pp. 203-216.
    • (1988) EUROCRYPT. Lecture Notes in Computer Science , vol.304 , pp. 203-216
    • Damgård, I.1
  • 11
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • Fagin, R., M. Naor, and P. Winkler: 1996, 'Comparing Information Without Leaking It', Communications of the ACM 39(5). 77-85.
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 12
    • 33646492430 scopus 로고
    • Cryptographic protection of databases and software
    • .T. Feigenbaum and M. Merritt (eds.).
    • Feigenbaum. J., M. Liberman, and R. Wright: 1991. 'Cryptographic Protection of Databases and Software', in. T. Feigenbaum and M. Merritt (eds.). Distributed Computing and Cryptography, Vol. 2. pp. 161-172.
    • (1991) Distributed Computing and Cryptography , vol.2 , pp. 161-172
    • Feigenbaum, J.1    Liberman, M.2    Wright, R.3
  • 15
    • 23944519585 scopus 로고    scopus 로고
    • Zero-knowledge twenty years after its invention
    • Department of Computer Science, Weizmann Institute of Science
    • Goldreich, O.: 2002. "Zero-knowledge Twenty Years after its Invention', Technical report, Department of Computer Science, Weizmann Institute of Science.
    • (2002) Technical Report
    • Goldreich, O.1
  • 16
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proofs
    • Goldreich. O., S. Micali. and A. Wigderson: 1991. 'Proofs that Yield Nothing But their Validity or All Languages in NP have Zero-Knowledge Proofs'. JACM 38. 691-729.
    • (1991) JACM , vol.38 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 18
    • 0025023289 scopus 로고
    • Reasoning about belief in cryptographic protocols
    • D. Cooper and T. Lunt (eds.). IEEE Computer Society Press, Los Angeles
    • Gong. L., R. Needham. and R. Yahalom: 1990. 'Reasoning About Belief in Cryptographic Protocols', in D. Cooper and T. Lunt (eds.). Proceedings 1990 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Angeles, pp. 234-248.
    • (1990) Proceedings 1990 IEEE Symposium on Research in Security and Privacy , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 19
    • 84955606093 scopus 로고    scopus 로고
    • Proving without knowing: On oblivious. Agnostic and blindfolded provers
    • N. Koblitz (ed.). Springer Verlag. Berlin
    • Jakobsson, M. and M. Yung: 1996, 'Proving without Knowing: On Oblivious. Agnostic and Blindfolded Provers', in N. Koblitz (ed.), Advances in Cryptology: Crypto '96 Proceedings, Lecture Notes in Computer Science, Vol. 1109. Springer Verlag. Berlin, pp. 186-200.
    • (1996) Advances in Cryptology: Crypto '96 Proceedings, Lecture Notes in Computer Science , vol.1109 , pp. 186-200
    • Jakobsson, M.1    Yung, M.2
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using FDR
    • Springer-Verlag, Berlin
    • Lowe, G: 1996. "Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR', in Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Vol. 1055, Springer-Verlag, Berlin, pp. 147-166.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 23
    • 0005010894 scopus 로고
    • Proposed federal information processing standard for secure hash standard
    • National Institute of Standards and Technology: 1992. 'Proposed Federal Information Processing Standard for Secure Hash Standard'. Federal Register 57(21). 3747-3749.
    • (1992) Federal Register , vol.57 , Issue.21 , pp. 3747-3749
  • 24
    • 0025405980 scopus 로고
    • A critique of the burrows. Abadi and needham logic
    • Nessett, D. M.: 1990, 'A Critique of the Burrows. Abadi and Needham Logic'. ACM SIGOPS Operating Systems Review 24(2), 35-38.
    • (1990) ACM SIGOPS Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 27
    • 27844464597 scopus 로고    scopus 로고
    • New protocols for proving knowledge of arbitrary secrets while not giving them away
    • P. McBurney, W van der Hoek. and M. Wooldridge (eds.). University of Liverpool, Liverpool
    • Teepe, W.: 2004a, 'New Protocols for Proving Knowledge of Arbitrary Secrets while not Giving them away", in P. McBurney, W van der Hoek. and M. Wooldridge (eds.). Proceedings of the First Knowledge and Games Workshop. University of Liverpool, Liverpool, pp. 99-116.
    • (2004) Proceedings of the First Knowledge and Games Workshop , pp. 99-116
    • Teepe, W.1
  • 29
    • 0026973508 scopus 로고
    • Message authentication with one-way hash functions
    • IEEE Computer Society Press. Los Angeles
    • Tsudik, G.: 1992. "Message Authentication with One-Way Hash Functions", in Proceedings of IEEE INFOCOM 1992. IEEE Computer Society Press. Los Angeles, pp. 2055-2059.
    • (1992) Proceedings of IEEE INFOCOM 1992 , pp. 2055-2059
    • Tsudik, G.1
  • 30
    • 1142270378 scopus 로고    scopus 로고
    • The russian cards problem
    • van Ditmarsch. H.: 2003, 'The Russian Cards Problem". Studio Logica 75, 31-62.
    • (2003) Studio Logica , vol.75 , pp. 31-62
    • Van Ditmarsch, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.