메뉴 건너뛰기




Volumn 3958 LNCS, Issue , 2006, Pages 58-74

Generic on-line/off-line threshold signatures

Author keywords

Bursty Traffic; Chameleon Hash Functions; On line Off line; Signature Schemes; Threshold Cryptography

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; FUNCTION EVALUATION; INFORMATION THEORY; NETWORK PROTOCOLS; ONLINE SYSTEMS;

EID: 33745855425     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11745853_5     Document Type: Conference Paper
Times cited : (25)

References (20)
  • 2
    • 20544449100 scopus 로고    scopus 로고
    • The one-more-RSA-inversion problems and the security of chamn's blind signature scheme
    • Mihir Bellare, Chanathip Namprempre, David Pointcheval, and Michael Senmnko. The One-More-RSA-Inversion Problems and the Security of Chamn's Blind Signature Scheme. Journal of Cryptology, 16(3):185-215, 2003.
    • (2003) Journal of Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Senmnko, M.4
  • 3
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • CRYPTO. Springer-Verlag
    • David Chaum and Torben P. Pedersen. Wallet Databases with Observers. In CRYPTO, volume 740 of Lecture Notes in Computer Science, pages 89-105. Springer-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 4
    • 24144467818 scopus 로고    scopus 로고
    • Efficient threshold RSA signatures with general moduli and no extra assumptions
    • Public Key Cryptography. Springer-Verlag
    • Ivan Damgård and Kasper Dupont. Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. In Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, pages 346-361. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 346-361
    • Damgård, I.1    Dupont, K.2
  • 5
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • CRYPTO. Springer-Verlag
    • Yvo Desmedt and Yair Frankel. Threshold Cryptosystems. In CRYPTO, volume 435 of Lecture Notes in Computer Science, pages 307-315. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 6
    • 85028913061 scopus 로고
    • On-line/off-line digital schemes
    • CRYPTO. Springer-Verlag
    • Shimon Even, Oded Goldreich, and Silvio Micali. On-Line/Off-Line Digital Schemes. In CRYPTO, volume 435 of Lecture Notes in Computer Science, pages 263-275. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 263-275
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 7
    • 84941152623 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete logarithm cryptosystems
    • To appear
    • Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. Secure Distributed Key Generation for Discrete Logarithm Cryptosystems. To appear, Journal of Cryptology. http://www.research.ibm.com/security/dkg03.ps.
    • Journal of Cryptology
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 11
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • April
    • Ralph Merkle. Protocols for Public Key Cryptosystems. In IEEE Symposium on Security and Privacy, pages 122-134, April 1980.
    • (1980) IEEE Symposium on Security and Privacy , pp. 122-134
    • Merkle, R.1
  • 14
    • 0026812659 scopus 로고
    • The design and implementation of a log-structured file system
    • February
    • Mendel Rosenblum and John K. Ousterhout. The Design and Implementation of a Log-Structured File System. In ACM Transactions on Computer Systems, volume 10, pages 26-52, February 1992.
    • (1992) ACM Transactions on Computer Systems , vol.10 , pp. 26-52
    • Rosenblum, M.1    Ousterhout, J.K.2
  • 16
    • 84880883264 scopus 로고    scopus 로고
    • Improved online/offline signature schemes
    • CRYPTO. Springer-Verlag
    • Adi Shamir and Yael Tauman. Improved Online/Offline Signature Schemes. In CRYPTO, volume 2139 of Lecture Notes in Computer Science, pages 355-367. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 17
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • EUROCRYPT. Springer-Verlag
    • Victor Shoup. Practical Threshold Signatures. In EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, pages 207-220. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 18
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • Chung Kei Wong and Simon S. Lam. Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. Netw., 7(4):502-513, 1999.
    • (1999) IEEE/ACM Trans. Netw. , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.K.1    Lam, S.S.2
  • 20
    • 0345757359 scopus 로고    scopus 로고
    • COCA: A secure distributed online certification authority
    • Lidong Zhou, Fred B. Schneider, and Robbert van Renesse. COCA: A Secure Distributed Online Certification Authority. ACM Trans. Computer Systems, 20(4):329-368, 2002.
    • (2002) ACM Trans. Computer Systems , vol.20 , Issue.4 , pp. 329-368
    • Zhou, L.1    Schneider, F.B.2    Van Renesse, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.