메뉴 건너뛰기




Volumn 2248, Issue , 2001, Pages 385-401

Mutually independent commitments

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 33745918093     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45682-1_23     Document Type: Conference Paper
Times cited : (9)

References (27)
  • 2
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • November
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850–863, November 1984.
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-863
    • Blum, M.1    Micali, S.2
  • 4
    • 84957802212 scopus 로고    scopus 로고
    • Efficient zeroknowledge proofs of knowledge without intractability assumptions
    • Springer-Verlag
    • Ronald Cramer, Ivan Damg˚ard, and Philip MacKenzie. Efficient zeroknowledge proofs of knowledge without intractability assumptions. In Public Key Cryptography (PKC 2000), pages 354–372. Springer-Verlag, 2000.
    • (2000) Public Key Cryptography (PKC 2000) , pp. 354-372
    • Cramer, R.1    Ivan, D.2    Mackenzie, P.3
  • 7
    • 84949308005 scopus 로고
    • Achieving independence in logarithmic number of rounds
    • Benny Chor and Michael Rabin. Achieving independence in logarithmic number of rounds. In Principles of Distributed Computing (PODC 87), pages 260–268. ACM, 1987.
    • (1987) Principles of Distributed Computing (PODC 87) , pp. 260-268
    • Chor, B.1    Rabin, M.2
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against chosen ciphertext attack
    • In Hugo Krawczyk, editor, Springer-Verlag, 23–27 August
    • R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against chosen ciphertext attack. In Hugo Krawczyk, editor, Advances in Cryptology—CRYPTO’98, volume 1462 of Lecture Notes in Computer Science. Springer-Verlag, 23–27 August 1998.
    • (1998) Advances in Cryptology—CRYPTO’98, Volume 1462 of Lecture Notes in Computer Science
    • Cramer, R.1    Shoup, V.2
  • 9
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM, 30:391–437, 2000.
    • (2000) SIAM , vol.30 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 13
    • 85028462775 scopus 로고
    • Zero-knowledge proofs of knowledge without interaction
    • Pittsburgh, Pennsylvania, 24–27 October, IEEE
    • Alfredo De Santis and Giuseppe Persiano. Zero-knowledge proofs of knowledge without interaction. In 33rd Annual Symposium on Foundations of Computer Science, pages 427–436, Pittsburgh, Pennsylvania, 24–27 October 1992. IEEE.
    • (1992) 33Rd Annual Symposium on Foundations of Computer Science , pp. 427-436
    • Santis, A.D.1    Persiano, G.2
  • 15
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • Uriel Feige, Amos Fiat, and Adi Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77–94, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 17
  • 21
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281–308, April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 23
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • Moni Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151–158, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 24
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • In J. Feigenbaum, editor, Springer-Verlag, August
    • Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology—CRYPTO’91, volume 576 of Lecture Notes in Computer Science, pages 129–140. Springer-Verlag, 1992, 11–15 August 1991.
    • (1992) Advances in Cryptology—CRYPTO’91, Volume 576 of Lecture Notes in Computer Science , pp. 129-140
    • Pedersen, T.P.1
  • 25
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero-knowledge and adaptive chosen-ciphertext security
    • New York, October, IEEE
    • Amit Sahai. Non-malleable non-interactive zero-knowledge and adaptive chosen-ciphertext security. In 40th Annual Symposium on Foundations of Computer Science, New York, October 1999. IEEE.
    • (1999) 40Th Annual Symposium on Foundations of Computer Science
    • Sahai, A.1
  • 26
    • 85032873931 scopus 로고
    • Efficient identification and signatures for smart cards
    • In J.-J. Quisquater and J. Vandewalle, editors, Springer-Verlag, 1990, 10–13 April
    • C. P. Schnorr. Efficient identification and signatures for smart cards. In J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology—EUROCRYPT 89, volume 434 of Lecture Notes in Computer Science, pages 688–689. Springer-Verlag, 1990, 10–13 April 1989.
    • (1989) Advances in Cryptology—EUROCRYPT 89, Volume 434 of Lecture Notes in Computer Science , pp. 688-689
    • Schnorr, C.P.1
  • 27
    • 0023568495 scopus 로고
    • Random self-reducibility and zero knowledge interactive proofs of possession of information
    • Los Angeles, California, 12–14 October, IEEE
    • Martin Tompa and Heather Woll. Random self-reducibility and zero knowledge interactive proofs of possession of information. In 28th Annual Symposium on Foundations of Computer Science, pages 472–482, Los Angeles, California, 12–14 October 1987. IEEE.
    • (1987) 28Th Annual Symposium on Foundations of Computer Science , pp. 472-482
    • Tompa, M.1    Woll, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.