메뉴 건너뛰기




Volumn 4965 LNCS, Issue , 2008, Pages 88-107

Threshold RSA for dynamic and Ad-Hoc groups

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; STEREOPHONIC BROADCASTING;

EID: 44449121781     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78967-3_6     Document Type: Conference Paper
Times cited : (41)

References (26)
  • 1
    • 84898960610 scopus 로고
    • Completeness Theorems for Noncryp-tographic Fault-Tolerant Distributed Computations
    • ACM Press, New York
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Noncryp-tographic Fault-Tolerant Distributed Computations. In: Proc. 20th STOC, pp. 1-10. ACM Press, New York (1988)
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 0002181960 scopus 로고
    • Digital Multisignatures
    • Baker, H, Piper, F, eds, Claredon Press, Oxford
    • Boyd, C.: Digital Multisignatures. In: Baker, H., Piper, F. (eds.) Cryptography and Coding, pp. 241-246. Claredon Press, Oxford (1989)
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 5
    • 0003200675 scopus 로고
    • Public-key cryptography and re-usable shared secrets
    • Baker, H, Piper, F, eds, Claredon Press, Oxford
    • Croft, R.A., Harris, S.P.: Public-key cryptography and re-usable shared secrets. In: Baker, H., Piper, F. (eds.) Cryptography and Coding, pp. 189-201. Claredon Press, Oxford (1989)
    • (1989) Cryptography and Coding , pp. 189-201
    • Croft, R.A.1    Harris, S.P.2
  • 6
    • 0027580298 scopus 로고
    • Efficient and secure multiparty generation of digital signatures based on discrete logarithms
    • Cerecedo, M., Matsumoto, T., Imai, H.: Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Trans. Fundamentals E76-A(4), 532-545 (1993)
    • (1993) IEICE Trans. Fundamentals , vol.E76-A , Issue.4 , pp. 532-545
    • Cerecedo, M.1    Matsumoto, T.2    Imai, H.3
  • 7
    • 84921068281 scopus 로고    scopus 로고
    • On the Exact Security of Full Domain Hash
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 8
  • 9
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120-127. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 11
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457-469. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 12
    • 44449121147 scopus 로고    scopus 로고
    • Personal Communication September
    • Fazio, N.: Personal Communication (September 2007)
    • (2007)
    • Fazio, N.1
  • 13
    • 84958676203 scopus 로고    scopus 로고
    • Proactive RSA
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Frankel, Y., Gemmell, P., Mackenzie, P., Yung, M.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440-454. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 440-454
    • Frankel, Y.1    Gemmell, P.2    Mackenzie, P.3    Yung, M.4
  • 14
    • 0029713931 scopus 로고    scopus 로고
    • Witness-based Cryptographic Program Checking and Robust Function Sharing
    • ACM Press, New York
    • Frankel, Y., Gemmell, P., Yung, M.: Witness-based Cryptographic Program Checking and Robust Function Sharing. In: Proc. 28th STOC, pp. 499-508. ACM Press, New York (1996)
    • (1996) Proc. 28th STOC , pp. 499-508
    • Frankel, Y.1    Gemmell, P.2    Yung, M.3
  • 16
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and efficient sharing of RSA functions. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 157-172. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 18
    • 84958670348 scopus 로고    scopus 로고
    • RSA-based Undeniable Signatures
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Gennaro, R., Krawczyk, H., Rabin, T.: RSA-based Undeniable Signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 397-416. Springer, Heidelberg (1997);
    • (1997) LNCS , vol.1294 , pp. 397-416
    • Gennaro, R.1    Krawczyk, H.2    Rabin, T.3
  • 19
    • 0012081094 scopus 로고    scopus 로고
    • Final version in J. Cryptology 13(4), 397-416 (2000)
    • Final version in J. Cryptology 13(4), 397-416 (2000)
  • 20
    • 0038425881 scopus 로고    scopus 로고
    • Gennaro, R., Krawczyk, H., Rabin, T.: Robust and Efficient Sharing of RSA Functions. Journal of Cryptology 13(2), 273-300 (2000); Conference version [16]
    • Gennaro, R., Krawczyk, H., Rabin, T.: Robust and Efficient Sharing of RSA Functions. Journal of Cryptology 13(2), 273-300 (2000); Conference version [16]
  • 21
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Computing 17(2), 281-308 (1988)
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communication of the ACM 21(2), 120-126 (1978)
    • (1978) Communication of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 23
  • 24
    • 38049015677 scopus 로고
    • On the Generation of Cryptographically Strong Pseudorandom Sequences
    • Shamir, A.: On the Generation of Cryptographically Strong Pseudorandom Sequences. ACM Trans. Comput. Syst. 1(1), 38-44 (1983)
    • (1983) ACM Trans. Comput. Syst , vol.1 , Issue.1 , pp. 38-44
    • Shamir, A.1
  • 25
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207-220. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.