메뉴 건너뛰기




Volumn 4964 LNCS, Issue , 2008, Pages 71-87

Separation results on the "one-more" computational problems

Author keywords

"One more" problems; Algebraic algorithms; Black box reductions; Random self reducible problems

Indexed keywords

ALGEBRA; ALGORITHMS; COMPUTATIONAL METHODS; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 43149115190     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79263-5_5     Document Type: Conference Paper
Times cited : (41)

References (18)
  • 1
    • 0035166072 scopus 로고    scopus 로고
    • How to Go Beyond the Black-Box Simulation Barrier
    • Barak, B.: How to Go Beyond the Black-Box Simulation Barrier. In: FOCS 2001, pp. 106-115 (2001)
    • (2001) FOCS 2001 , pp. 106-115
    • Barak, B.1
  • 2
    • 20544449100 scopus 로고    scopus 로고
    • The 1-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme
    • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The 1-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme. J. Crypto 16, 185-215
    • J. Crypto , vol.16 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 3
    • 20544455127 scopus 로고    scopus 로고
    • Transitive Signatures: New Proofs and Schemes
    • Bellare, M., Neven, G.: Transitive Signatures: New Proofs and Schemes. IEEE IT 51(6), 2133-2151
    • IEEE IT , vol.51 , Issue.6 , pp. 2133-2151
    • Bellare, M.1    Neven, G.2
  • 4
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Bellare, M., Palacio, A.: GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 162-177. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 6
    • 35248880074 scopus 로고    scopus 로고
    • Boldyreva, A.: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 31-46. Springer, Heidelberg (2002)
    • Boldyreva, A.: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31-46. Springer, Heidelberg (2002)
  • 7
    • 23044435711 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. J. Crypto 17(4), 297-319
    • J. Crypto , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 10
    • 0020915882 scopus 로고
    • Blind Signatures for Untraceable Payments
    • Chaum, D.: Blind Signatures for Untraceable Payments. In: CRYPTO 1982, pp. 199-203 (1982)
    • (1982) CRYPTO 1982 , pp. 199-203
    • Chaum, D.1
  • 11
    • 0010252194 scopus 로고
    • Undeniable Signatures
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212-216. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 212-216
    • Chaum, D.1    van Antwerpen, H.2
  • 12
    • 84959165880 scopus 로고
    • A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
    • Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
    • Guillou, L.C., Quisquater, J.-J.: A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123-128. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 14
    • 84937389342 scopus 로고    scopus 로고
    • Okamoto, T., Pointcheval, D.: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: PKC 2001, pp. 104-118 (2001)
    • Okamoto, T., Pointcheval, D.: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: PKC 2001, pp. 104-118 (2001)
  • 15
    • 33646784002 scopus 로고    scopus 로고
    • Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Paillier, P., Vergnaud, D.: Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 1-20. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 1-20
    • Paillier, P.1    Vergnaud, D.2
  • 16
    • 0000901529 scopus 로고    scopus 로고
    • Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. J. Crypto (3), 361-396
    • Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. J. Crypto (3), 361-396
  • 17
    • 12344258539 scopus 로고    scopus 로고
    • Schnorr, C.-P.: Efficient Signature Generation by Smart Cards. J. Crypto (3), 161-174
    • Schnorr, C.-P.: Efficient Signature Generation by Smart Cards. J. Crypto (3), 161-174
  • 18
    • 0023568495 scopus 로고
    • Random Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information
    • Tompa, M., Woll, H.: Random Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information. In: FOCS 1987, pp. 472-482 (1987)
    • (1987) FOCS 1987 , pp. 472-482
    • Tompa, M.1    Woll, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.