메뉴 건너뛰기




Volumn 2567, Issue , 2003, Pages 130-144

Strong key-insulated signature schemes

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMPUTATION THEORY; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 35248813300     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36288-6_10     Document Type: Article
Times cited : (211)

References (30)
  • 3
    • 0001229355 scopus 로고    scopus 로고
    • A Forward-Secure Digital Signature Scheme
    • M. Bellare and S. K. Miner. A Forward-Secure Digital Signature Scheme. Crypto '99.
    • Crypto '99
    • Bellare, M.1    Miner, S.K.2
  • 7
    • 18744390904 scopus 로고    scopus 로고
    • On the Power of Claw-Free Permutations
    • Y. Dodis and L. Reyzin. On the Power of Claw-Free Permutations. SCN 2002.
    • SCN 2002
    • Dodis, Y.1    Reyzin, L.2
  • 8
    • 0000097412 scopus 로고    scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Crypto '86.
    • Crypto '86
    • Fiat, A.1    Shamir, A.2
  • 9
    • 0038425881 scopus 로고    scopus 로고
    • Robust and Efficient Sharing of RSA Functions
    • R. Gennaro, T. Rabin, S. Jarecki, and H. Krawczyk. Robust and Efficient Sharing of RSA Functions. J. Crypto 13(2): 273-300 (2000).
    • (2000) J. Crypto , vol.13 , Issue.2 , pp. 273-300
    • Gennaro, R.1    Rabin, T.2    Jarecki, S.3    Krawczyk, H.4
  • 10
    • 84958813923 scopus 로고    scopus 로고
    • Relaxing Tamper-Resistance Requirements for Smart Cards Using (Auto)-Proxy Signatures
    • M. Girault. Relaxing Tamper-Resistance Requirements for Smart Cards Using (Auto)-Proxy Signatures. CARDIS '98.
    • CARDIS '98
    • Girault, M.1
  • 11
    • 35248837190 scopus 로고    scopus 로고
    • Self-Delegation with Controlled Propagation - Or - What if You Lose Your Laptop?
    • O. Goldreich, B. Pfitzmann, and R. L. Rivest. Self-Delegation with Controlled Propagation - or - What if You Lose Your Laptop? Crypto '98.
    • Crypto '98
    • Goldreich, O.1    Pfitzmann, B.2    Rivest, R.L.3
  • 12
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Computing 17(2): 281-308 (1988).
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 13
    • 0001654317 scopus 로고    scopus 로고
    • A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory
    • L. C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory. Eurocrypt '88.
    • Eurocrypt '88
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 15
    • 70549087421 scopus 로고    scopus 로고
    • Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions
    • G. Itkis. Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. SCN 2002.
    • SCN 2002
    • Itkis, G.1
  • 16
    • 84871980827 scopus 로고    scopus 로고
    • SiBIR: Signer-Base Intrusion-Resilient Signatures
    • G. Itkis and L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. Crypto 2002.
    • Crypto 2002
    • Itkis, G.1    Reyzin, L.2
  • 18
    • 84969357100 scopus 로고    scopus 로고
    • Threshold Crytptosystems Based on Factoring
    • J. Katz and M. Yung. Threshold Crytptosystems Based on Factoring. Asiacrypt 2002.
    • Asiacrypt 2002
    • Katz, J.1    Yung, M.2
  • 19
    • 35248860958 scopus 로고    scopus 로고
    • Secure Key-Evolving Protocols for Discrete Logarithm Schemes
    • C.-F. Lu and S. W. Shieh. Secure Key-Evolving Protocols for Discrete Logarithm Schemes. RSA 2002.
    • RSA 2002
    • Lu, C.-F.1    Shieh, S.W.2
  • 21
    • 35248819012 scopus 로고    scopus 로고
    • On Concrete Security Treatment of Signatures Derived from Identification
    • K. Ohta and T. Okamoto. On Concrete Security Treatment of Signatures Derived from Identification. Crypto '98.
    • Crypto '98
    • Ohta, K.1    Okamoto, T.2
  • 22
    • 0001859260 scopus 로고    scopus 로고
    • Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
    • T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. Crypto '92.
    • Crypto '92
    • Okamoto, T.1
  • 23
    • 0004743525 scopus 로고    scopus 로고
    • Fast Signature Generation with a Fiat-Shamir-Like Scheme
    • H. Ong and C. Schnorr. Fast Signature Generation with a Fiat-Shamir-Like Scheme. Eurocrypt '90.
    • Eurocrypt '90
    • Ong, H.1    Schnorr, C.2
  • 26
    • 12344258539 scopus 로고
    • Efficient Signature Generation by Smart Cards
    • C.P. Schnorr. Efficient Signature Generation by Smart Cards. J. Crypto 4(3): 161-174 (1991).
    • (1991) J. Crypto , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 27
    • 85086291924 scopus 로고    scopus 로고
    • t-root Identification and Signatures
    • t-root Identification and Signatures. Crypto '96.
    • Crypto '96
    • Schnorr, C.P.1
  • 28
    • 0001827537 scopus 로고    scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Crypto '84.
    • Crypto '84
    • Shamir, A.1
  • 29
    • 0004746654 scopus 로고    scopus 로고
    • On the Security of a Practical Identification Scheme
    • V. Shoup. On the Security of a Practical Identification Scheme. J. Crypto 12(4): 247-160 (1999).
    • (1999) J. Crypto , vol.12 , Issue.4 , pp. 247-1160
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.