메뉴 건너뛰기




Volumn 3797 LNCS, Issue , 2005, Pages 297-310

Short threshold signature schemes without random oracles

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PRIVACY; COMPUTER SCIENCE; DATA PRIVACY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33646831834     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11596219_24     Document Type: Conference Paper
Times cited : (27)

References (21)
  • 1
    • 84957069963 scopus 로고    scopus 로고
    • Robust distributed multiplication without interaction
    • LNCS 1666, Springer-Verlag
    • M. Abe. Robust distributed multiplication without interaction. In Advances in Cryptology - CRYPTO'99, LNCS 1666, Springer-Verlag, pp. 130-147 (1999).
    • (1999) Advances in Cryptology - CRYPTO'99 , pp. 130-147
    • Abe, M.1
  • 2
    • 84958748475 scopus 로고    scopus 로고
    • Non-interactive distributed-verifier proofs and proving relations among commitments
    • LNCS 2501, Springer-Verlag
    • M. Abe, R. Cramer and S. Fehr. Non-interactive distributed-verifier proofs and proving relations among commitments. In Advances in Cryptology - ASIACRYPT 2002, LNCS 2501, Springer-Verlag, pp. 206-223 (2002).
    • (2002) Advances in Cryptology - ASIACRYPT 2002 , pp. 206-223
    • Abe, M.1    Cramer, R.2    Fehr, S.3
  • 3
    • 33646833311 scopus 로고    scopus 로고
    • Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography
    • LNCS 3152, Springer-Verlag
    • M. Abe and S. Fehr. Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography. In Advances in Cryptology CRYPTO 2004, LNCS 3152, Springer-Verlag, pp. 317-334 (2004).
    • (2004) Advances in Cryptology CRYPTO 2004 , pp. 317-334
    • Abe, M.1    Fehr, S.2
  • 5
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • G.R. Blakley. Safeguarding cryptographic keys. In Proc. of AFIPS'79, pp. 313-317 (1979).
    • (1979) Proc. of AFIPS'79 , pp. 313-317
    • Blakley, G.R.1
  • 6
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • LNCS 3027, Springer-Verlag
    • D. Boneh and X. Boyen. Short signatures without random oracles. In Advances in Cryptology - EUROCRYPT 2004, LNCS 3027, Springer-Verlag, pp. 56-73 (2004).
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 11
    • 85024261619 scopus 로고    scopus 로고
    • Signature schemes based on the strong RSA assumption
    • R. Cramer and V. Shoup. Signature schemes based on the strong RSA assumption. ACM TISSEC, Vol. 3, No. 3, pp. 161-185 (2000).
    • (2000) ACM TISSEC , vol.3 , Issue.3 , pp. 161-185
    • Cramer, R.1    Shoup, V.2
  • 12
    • 84957661041 scopus 로고    scopus 로고
    • Secure hash-and-sign signatures without the random oracle
    • LNCS 1592, Springer-Verlag
    • R. Gennaro, S. Halevi and T. Rabin. Secure hash-and-sign signatures without the random oracle. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, Springer-Verlag, pp. 123-139 (1999).
    • (1999) Advances in Cryptology - EUROCRYPT'99 , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 13
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • LNCS 1592, Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, Springer-Verlag, pp. 295-310 (1999).
    • (1999) Advances in Cryptology - EUROCRYPT'99 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 15
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali and C. Rackoff. The knowledge complexity of interactive proof-systems. SIAM J. Computing, Vol. 18, No. 1, pp. 186-208 (1989).
    • (1989) SIAM J. Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 16
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, Vol. 17, No. 2, pp. 281-308 (1988).
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 17
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • LNCS 547, Springer-Verlag
    • T. Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology - EUROCRYPT'91, LNCS 547, Springer-Verlag, pp. 522-526 (1991).
    • (1991) Advances in Cryptology - EUROCRYPT'91 , pp. 522-526
    • Pedersen, T.1
  • 18
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • LNCS 576, Springer-Verlag
    • T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology - CRYPTO'91, LNCS 576, Springer-Verlag, pp. 129-140 (1991).
    • (1991) Advances in Cryptology - CRYPTO'91 , pp. 129-140
    • Pedersen, T.1
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, Vol. 22, No. 11, pp. 612-613 (1979).
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 21
    • 33646843187 scopus 로고
    • Error correction of algebraic block codes. U. S. Patent 4 633 470
    • L.R. Welch and E.R. Berlekamp. Error correction of algebraic block codes. U. S. Patent 4 633 470 (1983).
    • (1983)
    • Welch, L.R.1    Berlekamp, E.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.