메뉴 건너뛰기




Volumn 6632 LNCS, Issue , 2011, Pages 207-223

Adaptive pseudo-free groups and applications

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE ADVERSARY; GENERIC CONSTRUCTION; NON-TRIVIAL; SIGNATURE SCHEME;

EID: 79958003300     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-20465-4_13     Document Type: Conference Paper
Times cited : (55)

References (20)
  • 1
    • 34547139941 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 20(3), 395 (2007)
    • (2007) Journal of Cryptology , vol.20 , Issue.3 , pp. 395
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press, New York
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, Fairfax, Virginia, USA, November 3-5, pp. 62-73. ACM Press, New York (1993)
    • (1993) ACM CCS 1993, Fairfax, Virginia, USA, November 3-5 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 67049095592 scopus 로고    scopus 로고
    • Signing a linear subspace: Signature schemes for network coding
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 68-87
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 5
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 6
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press, Los Alamitos
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, Las Vegas, Nevada, USA, October 14-17, pp. 136-145. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) 42nd FOCS, Las Vegas, Nevada, USA, October 14-17 , pp. 136-145
    • Canetti, R.1
  • 8
    • 84890013435 scopus 로고    scopus 로고
    • Signature schemes based on the strong RSA assumption
    • Kent Ridge Digital Labs, Singapore, November 1-4, ACM Press, New York
    • Cramer, R., Shoup, V.: Signature schemes based on the strong RSA assumption. In: ACM CCS 1999, Kent Ridge Digital Labs, Singapore, November 1-4, pp. 46-51. ACM Press, New York (1999)
    • (1999) ACM CCS 1999 , pp. 46-51
    • Cramer, R.1    Shoup, V.2
  • 9
    • 0019649307 scopus 로고
    • On the security of public key protocols
    • Dolev, D., Yao, A.C.: On the security of public key protocols. In: FOCS, pp. 350-357 (1981)
    • (1981) FOCS , pp. 350-357
    • Dolev, D.1    Yao, A.C.2
  • 10
    • 35248856345 scopus 로고    scopus 로고
    • The Cramer-Shoup strong-RSA signature scheme revisited
    • Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
    • Fischlin, M.: The Cramer-Shoup strong-RSA signature scheme revisited. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 116-129. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2567 , pp. 116-129
    • Fischlin, M.1
  • 11
    • 84957661041 scopus 로고    scopus 로고
    • Secure hash-and-sign signatures without the random oracle
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 12
    • 78649897589 scopus 로고    scopus 로고
    • Secure network coding over the integers
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 142-160
    • Gennaro, R.1    Katz, J.2    Krawczyk, H.3    Rabin, T.4
  • 13
    • 51849152334 scopus 로고    scopus 로고
    • Programmable hash functions and their applications
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Programmable hash functions and their applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 21-38. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 21-38
    • Hofheinz, D.1    Kiltz, E.2
  • 16
    • 24944587257 scopus 로고    scopus 로고
    • The RSA group is pseudo-free
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Micciancio, D.: The RSA group is pseudo-free. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 387-403. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 387-403
    • Micciancio, D.1
  • 17
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 18
    • 35048877679 scopus 로고    scopus 로고
    • On the notion of pseudo-free groups
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Rivest, R.L.: On the notion of pseudo-free groups. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 505-521. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 505-521
    • Rivest, R.L.1
  • 19
    • 0035475986 scopus 로고    scopus 로고
    • New digital signature scheme attaining immunity to adaptive chosenmessage attack
    • Zhu, H.: New digital signature scheme attaining immunity to adaptive chosenmessage attack. Chinese Journal of Electronics 10(4), 484-486 (2001)
    • (2001) Chinese Journal of Electronics , vol.10 , Issue.4 , pp. 484-486
    • Zhu, H.1
  • 20
    • 38049071972 scopus 로고    scopus 로고
    • A formal proof of Zhu's signature scheme
    • ePrint Archive, Report 2003/155
    • H. Zhu. A formal proof of Zhu's signature scheme. Cryptology ePrint Archive, Report 2003/155 (2003), http://eprint.iacr.org/
    • (2003) Cryptology
    • Zhu, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.