메뉴 건너뛰기




Volumn 18, Issue 11, 2007, Pages 2871-2881

Universally composable security concurrent deniable authentication based on witness indistinguishable

Author keywords

Concurrent deniable authentication; Information security; Universally composable security; Verifiably smooth projective Hashing; Witness indistinguishable

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; NETWORK PROTOCOLS;

EID: 37349038164     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.1360/jos182871     Document Type: Article
Times cited : (13)

References (17)
  • 2
    • 37349005577 scopus 로고    scopus 로고
    • Deniable authentication protocol based on Diffie-Hellman algorithm
    • in Chinese
    • Xu CX, Fan L, Li JH. Deniable authentication protocol based on Diffie-Hellman algorithm. Computer Engineering, 2002, 28(10): 145-146 (in Chinese with English abstract).
    • (2002) Computer Engineering , vol.28 , Issue.10 , pp. 145-146
    • Xu, C.X.1    Fan, L.2    Li, J.H.3
  • 6
    • 33745211009 scopus 로고    scopus 로고
    • Cryptanalysis of a suite of deniable authentication protocols
    • Zhu RW, Wong DS, Lee CH. Cryptanalysis of a suite of deniable authentication protocols. IEEE Communications Letters, 2006, 10(6): 504-506.
    • (2006) IEEE Communications Letters , vol.10 , Issue.6 , pp. 504-506
    • Zhu, R.W.1    Wong, D.S.2    Lee, C.H.3
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • New York: IEEE Computer Society Press
    • Canetti R. Universally composable security: A new paradigm for cryptographic protocols. In: Proc. of the 42nd IEEE Symp. on the FOCS. New York: IEEE Computer Society Press, 2001. 136-145.
    • (2001) Proc. of the 42nd IEEE Symp. on the FOCS , pp. 136-145
    • Canetti, R.1
  • 11
    • 24944473997 scopus 로고    scopus 로고
    • Smooth projective hashing and two-message oblivious transfer
    • LNCS 3494, Berlin: Springer-Verlag
    • Kalai YT. Smooth projective hashing and two-message oblivious transfer. In: Advances in Cryptology, Eurocrypt 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 78-96.
    • (2005) Advances in Cryptology, Eurocrypt 2005 , pp. 78-96
    • Kalai, Y.T.1
  • 12
    • 84974602942 scopus 로고    scopus 로고
    • Improved non-committing encryption schemes based on general complexity assumptions
    • LNCS 1880, Berlin: Springer-Verlag
    • Damgard I, Nielsen JB. Improved non-committing encryption schemes based on general complexity assumptions. In: Proc. of the CRYPTO 2000. LNCS 1880, Berlin: Springer-Verlag, 2000. 432-450.
    • (2000) Proc. of the CRYPTO 2000 , pp. 432-450
    • Damgard, I.1    Nielsen, J.B.2
  • 14
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key cryptosystems based on composite-degree residuosity classes
    • LNCS 1592, Berlin: Springer-Verlag
    • Paillier P. Public-Key cryptosystems based on composite-degree residuosity classes. In: Advances in Cryptology, Eurocrypt'99. LNCS 1592, Berlin: Springer-Verlag, 1999. 223-238.
    • (1999) Advances in Cryptology, Eurocrypt'99 , pp. 223-238
    • Paillier, P.1
  • 15
    • 84947267092 scopus 로고    scopus 로고
    • Universal Hash proofs and a paradigm for adaptive chosen cipher text secure public-key encryption
    • LNCS 2332, Berlin: Springer-Verlag
    • Cramer R, Shoup V. Universal Hash proofs and a paradigm for adaptive chosen cipher text secure public-key encryption. In: Advances in Cryptology, Eurocrypt 2002. LNCS 2332, Berlin: Springer-Verlag, 2002. 45-64.
    • (2002) Advances in Cryptology, Eurocrypt 2002 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 16
    • 84860984371 scopus 로고    scopus 로고
    • Adaptively-Secure, non-interactive public-key encryption
    • Canetti R, Halevi S, Katz J. Adaptively-Secure, non-interactive public-key encryption. http://eprint.iacr.org/2004/317.pdf.
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 17
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • Dallas: ACM Press
    • Bellare M, Canetti R, Krawzyk H. A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. of the 30th Symp. on Theory of Computing. Dallas: ACM Press, 1998. 419-428.
    • (1998) Proc. of the 30th Symp. on Theory of Computing , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawzyk, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.