메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 346-358

Addition of ElGamal plaintexts

Author keywords

Addition; Directed decryption; ElGamal; Fast track; Repetition robustness

Indexed keywords

COMPUTATION THEORY; SECURITY OF DATA;

EID: 58349092253     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_26     Document Type: Conference Paper
Times cited : (6)

References (17)
  • 1
    • 85043778396 scopus 로고
    • Zero-Knowledge Undeniable Signatures
    • I Damgård, ed, Springer-Verlag, LNCS No. 473
    • D. Chaum, “Zero-Knowledge Undeniable Signatures,” in Advances in Cryptology – EUROCRYPT’90, I Damgård, ed., pp. 458–464, Springer-Verlag, 1990. LNCS No. 473.
    • (1990) Advances in Cryptology – EUROCRYPT’90
    • Chaum, D.1
  • 2
    • 0010252194 scopus 로고
    • Undeniable Signatures
    • G. Brassard, ed, Springer-Verlag, LNCS No. 435
    • D. Chaum and H. van Antwerpen, “Undeniable Signatures,” in Advances in Cryptology – CRYPTO’89, G. Brassard, ed., pp. 212–216, Springer-Verlag, 1989. LNCS No. 435.
    • (1989) Advances in Cryptology – CRYPTO’89
    • Chaum, D.1    Van Antwerpen, H.2
  • 3
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • D. Coppersmith, “Fast evaluation of logarithms in fields of characteristic two,” IEEE Transactions of Information Theory, 30 (1984), 587–594.
    • (1984) IEEE Transactions of Information Theory , vol.30 , pp. 587-594
    • Coppersmith, D.1
  • 4
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, vol. 31, pp. 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 6
    • 49049089688 scopus 로고    scopus 로고
    • Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    • Springer-Verlag, LNCS No. 1592
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Secure Distributed Key Generation for Discrete-Log Based Cryptosystems”, in Advances in Cryptology – EUROCRYPT’99, J. Stern, ed., pp. 295–310, Springer-Verlag, 1999. LNCS No. 1592.
    • (1999) Advances in Cryptology – EUROCRYPT’99, J. Stern , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 8
    • 24744445001 scopus 로고    scopus 로고
    • Efficient Oblivious Proofs of Correct Exponentiation
    • B. Preneel, ed, Kluwer Academic Publishers
    • M. Jakobsson and C.-P. Schnorr, “Efficient Oblivious Proofs of Correct Exponentiation,” in Communications and Multimedia Security (CMS)’99, B. Preneel, ed., pp. 71–84, Kluwer Academic Publishers.
    • Communications and Multimedia Security (CMS)’99 , pp. 71-84
    • Jakobsson, M.1    Schnorr, C.-P.2
  • 9
    • 84957709438 scopus 로고    scopus 로고
    • A Practical Mix
    • Nyberg, ed, Springer-Verlag, LNCS No. 1403
    • M. Jakobsson, “A Practical Mix,” in Advances in Cryptology – EUROCRYPT’98, K. Nyberg, ed., pp. 448–461, Springer-Verlag, 1998. LNCS No. 1403.
    • (1998) Advances in Cryptology – EUROCRYPT’98 , pp. 448-461
    • Jakobsson, M.1
  • 11
    • 84957626176 scopus 로고
    • Proactive Secret Sharing or How to Cope With Perpetual Leakage
    • D. Coppersmith, ed, Springer-Verlag, LNCS No. 963
    • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, “Proactive Secret Sharing or How to Cope With Perpetual Leakage,” in Advances in Cryptology – Crypto’95, D. Coppersmith, ed., pp. 339–352, Springer-Verlag, 1995. LNCS No. 963.
    • (1995) Advances in Cryptology – Crypto’95 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 12
    • 84937478328 scopus 로고    scopus 로고
    • personal communication
    • K. McCurley, personal communication.
    • McCurley, K.1
  • 14
    • 84876222959 scopus 로고
    • Distributed Provers with Applications to Undeniable Signatures
    • D.W. Davies, ed., Springer- Verlag, LNCS No. 547
    • T.P. Pedersen, “Distributed Provers with Applications to Undeniable Signatures,” in Advances in Cryptology – EUROCRYPT’91, D.W. Davies, ed., Springer- Verlag, pp. 221–242, 1991. LNCS No. 547.
    • (1991) Advances in Cryptology – EUROCRYPT’91 , pp. 221-242
    • Pedersen, T.P.1
  • 15
    • 84982943258 scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • J. Feigenbaum, ed, Springer-Verlag, LNCS NO. 576
    • T.P. Pedersen, “Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing,” in Advances in Cryptology – CRYPTO’91, J. Feigenbaum, ed., pp. 129–140, Springer-Verlag, 1991. LNCS NO. 576.
    • (1991) Advances in Cryptology – CRYPTO’91 , pp. 129-140
    • Pedersen, T.P.1
  • 16
    • 12344258539 scopus 로고
    • Efficient Signature Generation for Smart Cards
    • C.-P. Schnorr, “Efficient Signature Generation for Smart Cards,” Journal of Cryptology, vol. 4, pp. 161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.-P.1
  • 17
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, “How to share a secret”, Communications of the ACM, vol. 22, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.