메뉴 건너뛰기




Volumn 3027, Issue , 2004, Pages 590-608

Handcuffing big brother: An abuse-resilient transaction escrow scheme (extended abstract)

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 35048900318     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24676-3_35     Document Type: Article
Times cited : (34)

References (28)
  • 6
    • 0001868672 scopus 로고
    • Optimal asymmetric encryption
    • [BR94]
    • [BR94] M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Proc. Eurocrypt '94, pages 92-111, 1994.
    • (1994) Proc. Eurocrypt '94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
    • [CD00]
    • [CD00] J. Camenisch and I. Damgard. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In Proc. of Asiacrypt '00, pages 331-345, 2000.
    • (2000) Proc. of Asiacrypt '00 , pp. 331-345
    • Camenisch, J.1    Damgard, I.2
  • 8
    • 0034500567 scopus 로고    scopus 로고
    • Random oracles in Constantinople
    • [CKS00]
    • [CKS00] C. Cachin, K. Kursawe, and V. Shoup. Random oracles in Constantinople. In Proc. of PODC '00, pages 123-132, 2000.
    • (2000) Proc. of PODC '00 , pp. 123-132
    • Cachin, C.1    Kursawe, K.2    Shoup, V.3
  • 9
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • [CL01]
    • [CL01] J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Proc. Eurocrypt '01, pages 93-118, 2001.
    • (2001) Proc. Eurocrypt '01 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • [CL02]
    • [CL02] J. Camenish and A. Lysyanskaya. A signature scheme with efficient protocols. In Proc. SCN '02, pages 268-289, 2002.
    • (2002) Proc. SCN '02 , pp. 268-289
    • Camenish, J.1    Lysyanskaya, A.2
  • 11
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • [CM99]
    • [CM99] J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In Proc. Eurocrypt '99, pages 107-122, 1999.
    • (1999) Proc. Eurocrypt '99 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 12
    • 0002187137 scopus 로고
    • Wallet databases with observers
    • [CP92]
    • [CP92] D. Chaum and T. Pedersen. Wallet databases with observers. In Proc. Crypto '92, pages 89-105, 1992.
    • (1992) Proc. Crypto '92 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 13
    • 24644493543 scopus 로고    scopus 로고
    • Proof systems for general statements about discrete logarithms
    • [CS97] ETH Zürich, March
    • [CS97] J. Camenisch and M. Stadier. Proof systems for general statements about discrete logarithms. Technical Report TR 260, ETH Zürich, March 1997.
    • (1997) Technical Report TR 260
    • Camenisch, J.1    Stadier, M.2
  • 14
    • 35248847060 scopus 로고    scopus 로고
    • Verifiable encryption and decryption of discrete logarithms
    • [CS03]
    • [CS03] J. Camenisch and V. Shoup. Verifiable encryption and decryption of discrete logarithms. In Proc. of Crypto '03, pages 126-144, 2003.
    • (2003) Proc. of Crypto '03 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 15
    • 35048850603 scopus 로고    scopus 로고
    • An integer commitment scheme based on groups with hidden order
    • [DF01]
    • [DF01] I. Damgard and E. Fujisaki. An integer commitment scheme based on groups with hidden order. IACR 2001/064, 2001.
    • (2001) IACR 2001/064
    • Damgard, I.1    Fujisaki, E.2
  • 16
    • 18844454731 scopus 로고    scopus 로고
    • Efficient construction of (distributed) verifiable random functions
    • [Dod03]
    • [Dod03] Y. Dodis. Efficient construction of (distributed) verifiable random functions. In Proc. Public Key Cryptography '03, pages 1-17, 2003.
    • (2003) Proc. Public Key Cryptography '03 , pp. 1-17
    • Dodis, Y.1
  • 17
    • 0000613666 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • [Fel87]
    • [Fel87] P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In Proc. FOCS '87, pages 427-438, 1987.
    • (1987) Proc. FOCS '87 , pp. 427-438
    • Feldman, P.1
  • 18
    • 84957609649 scopus 로고    scopus 로고
    • Pseudorandom function tribe ensembles based on one-way permutations: Improvements and applications
    • [Fis99]
    • [Fis99] M. Fischlin. Pseudorandom function tribe ensembles based on one-way permutations: improvements and applications. In Proc. Eurocrypt '99, pages 432-445, 1999.
    • (1999) Proc. Eurocrypt '99 , pp. 432-445
    • Fischlin, M.1
  • 19
    • 84957685616 scopus 로고    scopus 로고
    • A practical and porvably secure scheme for publicly verifiable secret sharing and its applications
    • [FO98]
    • [FO98] E. Fujisaki and T. Okamoto. A practical and porvably secure scheme for publicly verifiable secret sharing and its applications. In Proc. Eurocrypt '98, pages 32-46, 1998.
    • (1998) Proc. Eurocrypt '98 , pp. 32-46
    • Fujisaki, E.1    Okamoto, T.2
  • 20
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • [GJKR99]
    • [GJKR99] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Proc. of Eurocrypt '99, pages 295-310, 1999.
    • (1999) Proc. of Eurocrypt '99 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 22
    • 84957640277 scopus 로고
    • Fair cryptosystems revisited
    • [KL95]
    • [KL95] J. Kilian and F.T. Leighton. Fair cryptosystems revisited. In Proc. Crypto '95, pages 208-221, 1995.
    • (1995) Proc. Crypto '95 , pp. 208-221
    • Kilian, J.1    Leighton, F.T.2
  • 23
    • 84937425161 scopus 로고    scopus 로고
    • Unique signatures and verifiable random functions from the DH-DDH separation
    • [Lys02]
    • [Lys02] A. Lysyanskaya. Unique signatures and verifiable random functions from the DH-DDH separation. In Proc. Crypto '02, pages 597-612, 2002.
    • (2002) Proc. Crypto '02 , pp. 597-612
    • Lysyanskaya, A.1
  • 24
    • 0010216321 scopus 로고
    • Fair public-key cryptosystems
    • [Mic92]
    • [Mic92] S. Micali. Fair public-key cryptosystems. In Proc. Crypto '92, pages 113-138, 1992.
    • (1992) Proc. Crypto '92 , pp. 113-138
    • Micali, S.1
  • 25
    • 0033346854 scopus 로고    scopus 로고
    • Verifiable random functions
    • [MRV99]
    • [MRV99] S. Micali, M. Rabin, and S. Vadhan. Verifiable random functions. In Proc. FOCS '99, pages 120-130, 1999.
    • (1999) Proc. FOCS '99 , pp. 120-130
    • Micali, S.1    Rabin, M.2    Vadhan, S.3
  • 26
    • 84957653598 scopus 로고    scopus 로고
    • Distributed pseudo-random functions and KDCs
    • [NPR99]
    • [NPR99] M. Naor, B. Pinkas, and O. Reingold. Distributed pseudo-random functions and KDCs. In Proc. of Eurocrypt '99, pages 327-346, 1999.
    • (1999) Proc. of Eurocrypt '99 , pp. 327-346
    • Naor, M.1    Pinkas, B.2    Reingold, O.3
  • 27
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • [Sho01]
    • [Sho01] V. Shoup. OAEP reconsidered. In Proc. of Crypto '01, pages 239-259, 2001.
    • (2001) Proc. of Crypto '01 , pp. 239-259
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.