메뉴 건너뛰기




Volumn 2727 LNCS, Issue , 2003, Pages 387-401

Parallel authentication and public-key encryption

Author keywords

Authentication; Parallelization; Privacy; Signcryption

Indexed keywords

CHOSEN CIPHER TEXT ATTACKS; CHOSEN-PLAINTEXT ATTACKS; ENCRYPTION SCHEMES; INDISTINGUISHABILITY; MESSAGE ATTACKS; PARALLELIZATION; PLAINTEXT ATTACKS; PRIVACY; PROVABLY SECURE; PUBLIC-KEY ENCRYPTIONS; RANDOM ORACLE MODELS; RANDOM ORACLES; RSA ASSUMPTIONS; RSA ENCRYPTIONS; SECURITY GOALS; SECURITY MODELS; SECURITY REQUIREMENTS; SECURITY STANDARDS; SIGNATURE SCHEMES; SIGNCRYPTION; UNIVERSAL FORGERIES; CHOSEN CIPHERTEXT ATTACK; CHOSEN-PLAINTEXT ATTACK; PARALLELIZATIONS; PUBLIC-KEY ENCRYPTION; RANDOM ORACLE MODEL;

EID: 63449113895     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45067-X_33     Document Type: Conference Paper
Times cited : (17)

References (17)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the Security of Joint Signatures and Enryption
    • Eurocrypt '02, Springer-Verlag, Berlin
    • J. H. An, Y. Dodis, and T. Rabin. On the Security of Joint Signatures and Enryption. In Eurocrypt '02, LNCS 2332, pages 83-107. Springer-Verlag, Berlin, 2002.
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Relations among Notions of Security for Public-Key Encryption Schemes
    • Crypto '98, Springer-Verlag, Berlin
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among Notions of Security for Public-Key Encryption Schemes. In Crypto '98, LNCS 1462, pages 26-45. Springer-Verlag, Berlin, 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 63449086790 scopus 로고    scopus 로고
    • Authenticated Encryption: Notions and Constructions
    • Asiacrypt '00, Springer-Verlag, Berlin
    • M. Bellare and C. Namprempre. Authenticated Encryption: Notions and Constructions. In Asiacrypt '00, LNCS 1976. Springer-Verlag, Berlin, 2000.
    • (2000) LNCS 1976
    • Bellare, M.1    Namprempre, C.2
  • 4
    • 84937429718 scopus 로고    scopus 로고
    • Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancies in Plaintexts for Efficient Cryptography
    • Asiacrypt '00, Springer-Verlag, Berlin
    • M. Bellare and P. Rogaway. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancies in Plaintexts for Efficient Cryptography. In Asiacrypt '00, LNCS 1976. Springer-Verlag, Berlin, 2000.
    • (2000) LNCS 1976
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0027726717 scopus 로고
    • Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols
    • ACM Press, New York
    • M. Bellare and P. Rogaway. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62-73. ACM Press, New York, 1993.
    • (1993) Proc. of the 1st CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption - How to Encrypt with RSA
    • Eurocrypt '94, Springer-Verlag, Berlin
    • M. Bellare and P. Rogaway. Optimal Asymmetric Encryption - How to Encrypt with RSA. In Eurocrypt '94, LNCS 950, pages 92-111. Springer-Verlag, Berlin, 1995.
    • (1995) LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84880853825 scopus 로고    scopus 로고
    • RSA-OAEP is Secure under the RSA Assumption
    • Crypto '01, Springer-Verlag, Berlin
    • E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. RSA-OAEP is Secure under the RSA Assumption. In Crypto '01, LNCS 2139, pages 260-274. Springer-Verlag, Berlin, 2001.
    • (2001) LNCS , vol.2139 , pp. 260-274
    • Fujisaki, E.1    Okamoto, T.2    Pointcheval, D.3    Stern, J.4
  • 10
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptative Chosen-Message Attacks
    • April
    • S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure Against Adaptative Chosen-Message Attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 11
    • 63449102645 scopus 로고    scopus 로고
    • J. Pieprzyk and D. Pointcheval. Parallel Authentication and Public-Key Encryption. In ACISP '03, LNCS. Springer-Verlag, Berlin, 2003. Full version available from http://www.di.ens.fr/users/pointche/.
    • J. Pieprzyk and D. Pointcheval. Parallel Authentication and Public-Key Encryption. In ACISP '03, LNCS. Springer-Verlag, Berlin, 2003. Full version available from http://www.di.ens.fr/users/pointche/.
  • 12
    • 0017930809 scopus 로고    scopus 로고
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
  • 13
    • 84866580706 scopus 로고    scopus 로고
    • RSA Data Security, Inc, Available from
    • RSA Data Security, Inc. Public Key Cryptography Standards - PKCS. Available from http://www.rsa.com/rsalabs/pubs/PKCS/.
    • Public Key Cryptography Standards - PKCS
  • 14
    • 0018545449 scopus 로고
    • How to Share a Secret
    • November
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22:612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 15
    • 84880904783 scopus 로고    scopus 로고
    • Crypto '01
    • Springer-Verlag, Berlin
    • V. Shoup. OAEP Reconsidered. In Crypto '01, LNCS 2139, pages 239-259. Springer-Verlag, Berlin, 2001.
    • (2001) LNCS , vol.2139 , pp. 239-259
    • Shoup, V.1    Reconsidered, O.A.E.P.2
  • 16
    • 84937411969 scopus 로고    scopus 로고
    • Flaws in Applying Proof Methodologies to Signature Schemes
    • Crypto '02, Springer-Verlag, Berlin
    • J. Malone-Lee, D. Pointcheval, N. Smart, and J. Stern. Flaws in Applying Proof Methodologies to Signature Schemes. In Crypto '02, LNCS 2442, pages 93-110. Springer-Verlag, Berlin, 2002.
    • (2002) LNCS , vol.2442 , pp. 93-110
    • Malone-Lee, J.1    Pointcheval, D.2    Smart, N.3    Stern, J.4
  • 17
    • 63449122349 scopus 로고    scopus 로고
    • Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption)
    • Crypto '97, Springer-Verlag, Berlin
    • Y. Zheng. Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption). In Crypto '97, LNCS 1294. Springer-Verlag, Berlin, 1997.
    • (1997) LNCS , vol.1294
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.