메뉴 건너뛰기




Volumn 3152, Issue , 2004, Pages 317-334

Adaptively secure feldman vss and applications to universally-composable threshold cryptography

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; NETWORK SECURITY;

EID: 33646833311     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-28628-8_20     Document Type: Article
Times cited : (37)

References (16)
  • 1
    • 84957069963 scopus 로고    scopus 로고
    • Robust distributed multiplication without interaction
    • M. Wiener, editor, Advances in Cryptology -CRYPTO '99, Springer-Verlag
    • M. Abe. Robust distributed multiplication without interaction. In M. Wiener, editor, Advances in Cryptology -CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 130-147. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 130-147
    • Abe, M.1
  • 2
    • 84958748475 scopus 로고    scopus 로고
    • Non-interactive distributed-verifier proofs and proving relations among commitments
    • Y. Zheng, editor, Advances in Cryptology - ASIACRYPT '02, Springer-Verlag
    • M. Abe, R. Cramer, and S. Fehr. Non-interactive distributed-verifier proofs and proving relations among commitments. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT '02, volume 2501 of Lecture Notes in Computer Science, pages 206-223. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 206-223
    • Abe, M.1    Cramer, R.2    Fehr, S.3
  • 7
    • 84957083549 scopus 로고    scopus 로고
    • Adaptive security for threshold cryptosystems
    • M. Wiener, editor, Advances in Cryptology CRYPTO '99, Springer-Verlag
    • R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive security for threshold cryptosystems. In M. Wiener, editor, Advances in Cryptology CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 98-115. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 98-115
    • Canetti, R.1    Gennaro, R.2    Jarecki, S.3    Krawczyk, H.4    Rabin, T.5
  • 9
    • 84974602942 scopus 로고    scopus 로고
    • Improved non-committing encryption schemes based on a general complexity assumption
    • M. Bellare, editor, Advances in Cryptology CRYPTO 2000, Springer-Verlag
    • I. Damgård and J. Nielsen. Improved non-committing encryption schemes based on a general complexity assumption. In M. Bellare, editor, Advances in Cryptology CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 432-450. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 432-450
    • Damgård, I.1    Nielsen, J.2
  • 11
    • 84958045007 scopus 로고    scopus 로고
    • Adaptively-secure distributed publickey systems
    • J. Nesetril, editor, European Symposium on Algorithms (ESA '99), Springer-Verlag
    • Y. Frankel, P. D. MacKenzie, and M. Yung. Adaptively-secure distributed publickey systems. In J. Nesetril, editor, European Symposium on Algorithms (ESA '99), volume 1643 of Lecture Notes in Computer Science, pages 4-27. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1643 , pp. 4-27
    • Frankel, Y.1    MacKenzie, P.D.2    Yung, M.3
  • 12
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • J. Stern, editor, Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 295-310. Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT '99 , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 13
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively secure threshold cryptography: Introducing concurrency, removing erasures (extended abstract)
    • B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
    • S. Jarecki and A. Lysyanskaya. Adaptively secure threshold cryptography: Introducing concurrency, removing erasures (extended abstract). In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 221-242. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 221-242
    • Jarecki, S.1    Lysyanskaya, A.2
  • 14
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Springer-Verlag
    • T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 522-526. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 522-526
    • Pedersen, T.P.1
  • 15
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239-252, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 16
    • 35048873776 scopus 로고    scopus 로고
    • A universally composable mix-net
    • Proceedings of the First Theory of Cryptography Conference (TCC'04), Springer-Verlag
    • D. Wikström. A universally composable mix-net. In Proceedings of the First Theory of Cryptography Conference (TCC'04), volume 2951 of Lecture Notes in Computer Science, pages 315-335. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 315-335
    • Wikström, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.