메뉴 건너뛰기




Volumn , Issue , 2009, Pages 119-128

Distributed key generation for the internet

Author keywords

[No Author keywords available]

Indexed keywords

BYZANTINE AGREEMENT; DISTRIBUTED KEY GENERATION; PRACTICAL SYSTEMS; PROACTIVE SECURITY; RANDOMIZED PROTOCOLS; VERIFIABLE SECRET SHARING SCHEME;

EID: 70350216066     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2009.21     Document Type: Conference Paper
Times cited : (58)

References (29)
  • 1
    • 84982943258 scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • T. P. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," in Advances in Cryptology - CRYPTO'91, 1991, pp. 129-140.
    • (1991) Advances in Cryptology - CRYPTO'91 , pp. 129-140
    • Pedersen, T.P.1
  • 2
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, "How to Share a Secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 7
    • 0034500567 scopus 로고    scopus 로고
    • Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography
    • C. Cachin, K. Kursawe, and V. Shoup, "Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography," in PODC'00, 2000, pp. 123-132.
    • (2000) PODC'00 , pp. 123-132
    • Cachin, C.1    Kursawe, K.2    Shoup, V.3
  • 8
    • 84937429269 scopus 로고    scopus 로고
    • A Threshold Pseudorandom Function Construction and Its Applications
    • J. B. Nielsen, "A Threshold Pseudorandom Function Construction and Its Applications," in Advances in Cryptology - CRYPTO'02, 2002, pp. 401-416.
    • (2002) Advances in Cryptology - CRYPTO'02 , pp. 401-416
    • Nielsen, J.B.1
  • 9
    • 33846862213 scopus 로고    scopus 로고
    • Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems," Journal of Cryptology, vol. 20, no. 1, pp. 51-83, 2007.
    • (2007) Journal of Cryptology , vol.20 , Issue.1 , pp. 51-83
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 10
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
    • B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," in FOCS'85, 1985, pp. 383-395.
    • (1985) FOCS'85 , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 11
    • 0023538330 scopus 로고
    • A Practical Scheme for Non-interactive Verifiable Secret Sharing
    • P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing," in FOCS'87, 1987, pp. 427-437.
    • (1987) FOCS'87 , pp. 427-437
    • Feldman, P.1
  • 12
    • 85027164480 scopus 로고
    • How to Withstand Mobile Virus Attacks (Ext. Abstract)
    • R. Ostrovsky and M. Yung, "How to Withstand Mobile Virus Attacks (Ext. Abstract)," in PODC'91, 1991, pp. 51-59.
    • (1991) PODC'91 , pp. 51-59
    • Ostrovsky, R.1    Yung, M.2
  • 14
    • 0027313816 scopus 로고
    • Fast asynchronous byzantine agreement with optimal resilience
    • R. Canetti and T. Rabin, "Fast asynchronous byzantine agreement with optimal resilience," in STOC'93, 1993, pp. 42-51.
    • (1993) STOC'93 , pp. 42-51
    • Canetti, R.1    Rabin, T.2
  • 15
    • 57549095453 scopus 로고    scopus 로고
    • An Almost-surely Terminating Polynomial Protocol for Asynchronous Byzantine Agreement with Optimal Resilience
    • I. Abraham, D. Dolev, and J. Y. Halpern, "An Almost-surely Terminating Polynomial Protocol for Asynchronous Byzantine Agreement with Optimal Resilience," in PODC'08, 2008, pp. 405-414.
    • (2008) PODC'08 , pp. 405-414
    • Abraham, I.1    Dolev, D.2    Halpern, J.Y.3
  • 16
    • 70350247288 scopus 로고    scopus 로고
    • Efficient Asynchronous Verifiable Secret Sharing and Byzantine Agreement with Optimal Resilience
    • A. Patra, A. Choudhary, and C. P. Rangan, "Efficient Asynchronous Verifiable Secret Sharing and Byzantine Agreement with Optimal Resilience," Cryptology ePrint: 2008/424, 2008.
    • (2008) Cryptology ePrint , vol.424 , pp. 2008
    • Patra, A.1    Choudhary, A.2    Rangan, C.P.3
  • 17
    • 0038687710 scopus 로고    scopus 로고
    • Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
    • C. Cachin, K. Kursawe, A.Lysyanskaya, and R. Strobl, "Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems," in CCS'02, 2002, pp. 88-97.
    • (2002) CCS'02 , pp. 88-97
    • Cachin, C.1    Kursawe, K.2    Lysyanskaya, A.3    Strobl, R.4
  • 18
    • 27644508954 scopus 로고    scopus 로고
    • APSS: Proactive Secret Sharing in Asynchronous Systems
    • L. Zhou, F. B. Schneider, and R. van Renesse, "APSS: Proactive Secret Sharing in Asynchronous Systems," ACM Trans. Inf. Syst. Secur., vol. 8, no. 3, pp. 259-286, 2005.
    • (2005) ACM Trans. Inf. Syst. Secur , vol.8 , Issue.3 , pp. 259-286
    • Zhou, L.1    Schneider, F.B.2    van Renesse, R.3
  • 19
    • 57549114280 scopus 로고    scopus 로고
    • Mobile Proactive Secret Sharing
    • Extended Draft
    • D. A. Schultz, B. Liskov, and M. Liskov, "Mobile Proactive Secret Sharing," in PODC'08, 2008, p. 458, (Extended Draft).
    • (2008) PODC'08 , pp. 458
    • Schultz, D.A.1    Liskov, B.2    Liskov, M.3
  • 20
    • 0011797655 scopus 로고
    • An Asynchronous [(n-1)/3]-Resilient Consensus Protocol
    • G. Bracha, "An Asynchronous [(n-1)/3]-Resilient Consensus Protocol," in PODC'84, 1984, pp. 154-162.
    • (1984) PODC'84 , pp. 154-162
    • Bracha, G.1
  • 21
    • 0023994903 scopus 로고
    • Consensus in the Presence of Partial Synchrony
    • C. Dwork, N. A. Lynch, and L. J. Stockmeyer, "Consensus in the Presence of Partial Synchrony," Journal of ACM, vol. 35, no. 2, pp. 288-323, 1988.
    • (1988) Journal of ACM , vol.35 , Issue.2 , pp. 288-323
    • Dwork, C.1    Lynch, N.A.2    Stockmeyer, L.J.3
  • 22
    • 0022045868 scopus 로고
    • Impossibility of Distributed Consensus with One Faulty Process
    • M. J. Fischer, N. A. Lynch, and M. Paterson, "Impossibility of Distributed Consensus with One Faulty Process," Journal of ACM, vol. 32, no. 2, pp. 374-382, 1985.
    • (1985) Journal of ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.3
  • 23
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine Fault Tolerance and Proactive Recovery
    • M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance and Proactive Recovery," ACM Trans. Comput. Syst., vol. 20, no. 4, pp. 398-461, 2002.
    • (2002) ACM Trans. Comput. Syst , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 24
    • 1542288257 scopus 로고    scopus 로고
    • Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries
    • M. Backes and C. Cachin, "Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries," in DSN'03, 2003, pp. 37-46.
    • (2003) DSN'03 , pp. 37-46
    • Backes, M.1    Cachin, C.2
  • 26
    • 0027188428 scopus 로고
    • Asynchronous Secure Computation
    • M. Ben-Or, R. Canetti, and O. Goldreich, "Asynchronous Secure Computation," in STOC'93, 1993, pp. 52-61.
    • (1993) STOC'93 , pp. 52-61
    • Ben-Or, M.1    Canetti, R.2    Goldreich, O.3
  • 28
    • 1142268843 scopus 로고    scopus 로고
    • Proactive Secure Message Transmission in Asynchronous Networks
    • M. Backes, C. Cachin, and R. Strobl, "Proactive Secure Message Transmission in Asynchronous Networks," in PODC'03, 2003, pp. 223-232.
    • (2003) PODC'03 , pp. 223-232
    • Backes, M.1    Cachin, C.2    Strobl, R.3
  • 29
    • 0003070483 scopus 로고
    • Fault-tolerant Broadcasts and Related Problems
    • 2nd Ed, ACM Press
    • V. Hadzilacos and S. Toueg, "Fault-tolerant Broadcasts and Related Problems," in Distributed systems (2nd Ed.). ACM Press, 1993, pp. 97-145.
    • (1993) Distributed systems , pp. 97-145
    • Hadzilacos, V.1    Toueg, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.