메뉴 건너뛰기




Volumn , Issue , 2003, Pages 47-54

Breaking and repairing optimistic fair exchange from PODC 2003

Author keywords

Digital signatures; Fair exchange; Multisignatures; Verifiably committed signatures; Verifiably encrypted signatures

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; CRYPTOGRAPHY; ELECTRONIC COMMERCE; ELECTRONICS ENGINEERING; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA; SET THEORY; SIMULATORS; TELECOMMUNICATION NETWORKS; THEOREM PROVING;

EID: 4544253137     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/947380.947387     Document Type: Conference Paper
Times cited : (120)

References (22)
  • 1
    • 84957616594 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • K. Nyberg, editor, Advances in Cryptology - EUROCRYPT 98. Springer-Verlag, May 31-June 4
    • N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. In K. Nyberg, editor, Advances in Cryptology - EUROCRYPT 98, volume 1403 of Lecture Notes in Computer Science, pages 591-606. Springer-Verlag, May 31-June 4 1998.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 591-606
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 3
    • 0033281266 scopus 로고    scopus 로고
    • Efficient verifiable encryption (and fair exchange) of digital signatures
    • G. Tsudik, editor. ACM, Nov.
    • G. Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. In G. Tsudik, editor, Sixth ACM Conference on Computer and Communication Security, pages 138-146. ACM, Nov. 1999.
    • (1999) Sixth ACM Conference on Computer and Communication Security , pp. 138-146
    • Ateniese, G.1
  • 5
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • November. Revised version
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 62-73, November 1993. Revised version available from http://www-cse.ucsd.edu/users/mihir/.
    • (1993) Proceedings of the 1st ACM Conference on Computer and Communication Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • J. Kilian, editor, Advances in Cryptology - CRYPTO 2001. Springer-Verlag, 19-23 Aug.
    • D. Boneh and M. Franklin. Identity based encryption from the weil pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag, 19-23 Aug. 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • E. Biham, editor, Lecture Notes in Computer Science. Springer-Verlag, 4 May-8 May
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, pages 416-432. Springer-Verlag, 4 May-8 May 2003.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 9
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, Gold Coast, Australia, 9-13 Dec. Springer-Verlag
    • D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 514-532, Gold Coast, Australia, 9-13 Dec. 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 10
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
    • T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, Kyoto, Japan, 3-7 Dec. Springer-Verlag
    • J. Camenisch and I. B. Damgård. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 331-345, Kyoto, Japan, 3-7 Dec. 2000. Springer-Verlag.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgård, I.B.2
  • 12
    • 84948970342 scopus 로고
    • Designated confirmer signatures
    • A. De Santis, editor, Advances in Cryptology - EUROCRYPT 94. Springer-Verlag, 1995, 9-12 May
    • D. Chaum. Designated confirmer signatures. In A. De Santis, editor, Advances in Cryptology - EUROCRYPT 94, volume 950 of Lecture Notes in Computer Science, pages 86-91. Springer-Verlag, 1995, 9-12 May 1994.
    • (1994) Lecture Notes in Computer Science , vol.950 , pp. 86-91
    • Chaum, D.1
  • 13
    • 18844420484 scopus 로고    scopus 로고
    • Boneh et al's k-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption
    • C. Laih, editor, Taipei, Taiwan, Nov 30 - Dec 4. Springer-Verlag
    • J.-S. Coron and D. Naccache. Boneh et al's k-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption. In C. Laih, editor, Advances in Cryptology - ASIACRYPT-2003, Taipei, Taiwan, Nov 30 - Dec 4, 2003. Springer-Verlag.
    • (2003) Advances in Cryptology - ASIACRYPT-2003
    • Coron, J.-S.1    Naccache, D.2
  • 14
    • 84958756891 scopus 로고    scopus 로고
    • 6th international workshop on practice and theory in public key cryptosystems - PKC 2003
    • Springer-Verlag, Jan.
    • Y. Desmedt, editor. 6th International Workshop on Practice and Theory in Public Key Cryptosystems - PKC 2003, volume 2567 of Lecture Notes in Computer Science. Springer-Verlag, Jan. 2003.
    • (2003) Lecture Notes in Computer Science , vol.2567
    • Desmedt, Y.1
  • 16
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical id-based cryptography
    • Y. Zheng, editor, Advances in Cryptology - ASIACRYPT-2002, Queenstown, New Zealand, 1-5 Dec. Springer-Verlag
    • C. Gentry and A. Silverberg. Hierarchical id-based cryptography. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT-2002, volume 2501 of Lecture Notes in Computer Science, Queenstown, New Zealand, 1-5 Dec. 2002. Springer-Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2501
    • Gentry, C.1    Silverberg, A.2
  • 17
    • 84946844750 scopus 로고    scopus 로고
    • A one-round protocol for tripartite Diffie-Hellman
    • ANTS-IV Conference, Spring-Verlag
    • A. Joux. A one-round protocol for tripartite Diffie-Hellman. In ANTS-IV Conference, volume 1838 of Lecture Notes in Computer Science, pages 385-394. Spring-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 385-394
    • Joux, A.1
  • 18
    • 0038087188 scopus 로고    scopus 로고
    • Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
    • A. Joux and K. Nguyen. Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. IACR E-print Archive. Available from http://eprint.iacr.org/2001/003/, 2001.
    • (2001) IACR E-print Archive
    • Joux, A.1    Nguyen, K.2
  • 20
    • 84937425161 scopus 로고    scopus 로고
    • Unique signatures and verifiable random functions from the DH-DDH separation
    • M. Yung, editor, Lecture Notes in Computer Science. Springer-Verlag, 18-22 Aug.
    • A. Lysyanskaya. Unique signatures and verifiable random functions from the DH-DDH separation. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science. Springer-Verlag, 18-22 Aug. 2002.
    • (2002) Advances in Cryptology - CRYPTO 2002
    • Lysyanskaya, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.