메뉴 건너뛰기




Volumn 2742, Issue , 2003, Pages 286-302

Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 35248863570     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45126-6_21     Document Type: Article
Times cited : (20)

References (21)
  • 3
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • IEEE Press
    • P. Feldman. A practical scheme for non-interactive verifiable secret sharing. Proceedings of FOCS'87, IEEE Press, pp. 427-437 (1987).
    • (1987) Proceedings of FOCS'87 , pp. 427-437
    • Feldman, P.1
  • 4
    • 84937439482 scopus 로고    scopus 로고
    • One round threshold discrete-log key generation without private channels
    • Proceedings of PKC'01, Springer-Verlag
    • P.A. Fouque and J. Stern. One round threshold discrete-log key generation without private channels. Proceedings of PKC'01, LNCS 1992, Springer-Verlag, pp. 190-206 (2001).
    • (2001) LNCS , vol.1992 , pp. 190-206
    • Fouque, P.A.1    Stern, J.2
  • 5
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Advances in Cryptology-Eurocrypt'96, Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Robust threshold DSS signatures. Advances in Cryptology-Eurocrypt'96, LNCS 1070, Springer-Verlag, pp. 354-371 (1996).
    • (1996) LNCS , vol.1070 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 6
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • Advances in Cryptology-Eurocrypt'99, Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. Advances in Cryptology-Eurocrypt'99, LNCS 1592, Springer-Verlag, pp. 295-310 (1999).
    • (1999) LNCS , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 7
    • 0030693496 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in secure multi-party computation
    • M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation. Proceedings of PODC'97, pp. 25-34 (1997).
    • (1997) Proceedings of PODC'97 , pp. 25-34
    • Hirt, M.1    Maurer, U.2
  • 8
    • 0141518230 scopus 로고    scopus 로고
    • A secure nonrepudiable threshold proxy signature scheme with known signers
    • M. Hwang, I. Lin and E.J. Lu. A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica, vol. 11, no. 2, pp. 1-8, (2000).
    • (2000) International Journal of Informatica , vol.11 , Issue.2 , pp. 1-8
    • Hwang, M.1    Lin, I.2    Lu, E.J.3
  • 10
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its applications
    • B. Lee, H. Kim and K. Kim. Strong proxy signature and its applications. Proceedings of SCIS'01, Vol. 2/2, pp. 603-608 (2001).
    • (2001) Proceedings of SCIS'01 , vol.2 , Issue.2 , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 11
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • M. Mambo, K. Usuda and E. Okamoto. Proxy signatures: Delegation of the power to sign messages. IEICE Transactions Fundamentals, Vol. E79-A, No. 9, pp. 1338-1353 (1996).
    • (1996) IEICE Transactions Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 12
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Advances in Cryptoplogy-Crypto'91, Springer-Verlag
    • T.P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptoplogy-Crypto'91, LNCS 576, Springer-Verlag, pp. 129-140 (1991).
    • (1991) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 13
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Springer-Verlag
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, Vol. 13, Num. 3, Springer-Verlag, pp. 361-396 (2000).
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 14
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, Vol. 4, pp. 161-174 (1991).
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 15
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its applications to electronic voting
    • Advances in Cryptology-Crypto'99, Springer-Verlag
    • B. Schoenmakers. A simple publicly verifiable secret sharing scheme and its applications to electronic voting. Advances in Cryptology-Crypto'99, LNCS 1666, Springer-Verlag, pp. 148-164 (1999).
    • (1999) LNCS , vol.1666 , pp. 148-164
    • Schoenmakers, B.1
  • 16
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, No. 22, pp. 612-613 (1979).
    • (1979) Communications of the ACM , Issue.22 , pp. 612-613
    • Shamir, A.1
  • 17
    • 0037435795 scopus 로고    scopus 로고
    • Proxy signature schemes based on factoring
    • Z. Shao. Proxy signature schemes based on factoring. Information Processing Letters, No. 85, pp. 137-143 (2003).
    • (2003) Information Processing Letters , Issue.85 , pp. 137-143
    • Shao, Z.1
  • 18
    • 84948954277 scopus 로고    scopus 로고
    • Practical Threshold Signatures
    • Advances in Cryptology-Eurocrypt'00, Springer-Verlag
    • V. Shoup. Practical Threshold Signatures. Advances in Cryptology-Eurocrypt'00, LNCS 1807, Springer-Verlag, pp. 207-220 (2000).
    • (2000) LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 20
    • 84958772823 scopus 로고    scopus 로고
    • Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates
    • Proceedings ACISP'01, Springer-Verlag
    • D.R. Stinson and R. Strobl. Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates. Proceedings ACISP'01, LNCS 2119, Springer-Verlag, pp. 417-434, (2001).
    • (2001) LNCS , vol.2119 , pp. 417-434
    • Stinson, D.R.1    Strobl, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.