메뉴 건너뛰기




Volumn 7, Issue 6, 2012, Pages 1687-1694

Efficient fair conditional payments for outsourcing computations

Author keywords

electronic cash; Outsourcing computations; ringers; verifiable encryption

Indexed keywords

COMPUTATION MODEL; DISTRIBUTED ENVIRONMENTS; ELECTRONIC CASH; ELECTRONIC CASH SYSTEMS; SECRET SHARING; SEMI-TRUSTED THIRD PARTIES; VERIFIABLE ENCRYPTIONS;

EID: 84870282993     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2210880     Document Type: Article
Times cited : (118)

References (39)
  • 1
    • 3142585398 scopus 로고    scopus 로고
    • Verifiable encryption of digital signatures and applications
    • ACM Press
    • G. Ateniese, "Verifiable encryption of digital signatures and applications," ACM Trans. Inf. Syst. Security, vol. 7, no. 1, pp. 1-20, 2004, ACM Press.
    • (2004) ACM Trans. Inf. Syst. Security , vol.7 , Issue.1 , pp. 1-20
    • Ateniese, G.1
  • 4
    • 84957616594 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • Advances in Cryptology - EUROCRYPT '98
    • N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures," in Proc. Advances in Cryptology-Eurocrypt 1998 (LNCS 1403), Berlin, Heidelberg, New York, 1998, pp. 591-606, Springer. (Pubitemid 128081515)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 591-606
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 5
    • 0033750375 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • Apr
    • N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures," IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 593-610, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun , vol.18 , Issue.4 , pp. 593-610
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 6
    • 45749113016 scopus 로고    scopus 로고
    • Improved conditional e-payments
    • Springer-Verlag
    • M. Blanton, "Improved conditional e-payments," in Proc. ACNS 2008, LNCS 5037, 2008, pp. 188-206, Springer-Verlag.
    • (2008) Proc. ACNS 2008, LNCS , vol.5037 , pp. 188-206
    • Blanton, M.1
  • 7
    • 84976804419 scopus 로고
    • How to exchange (secret) keys
    • M. Blum, "How to exchange (secret) keys," ACMTrans. Comput. Syst., vol. 1, no. 2, pp. 175-193, 1983.
    • (1983) ACMTrans. Comput. Syst , vol.1 , Issue.2 , pp. 175-193
    • Blum, M.1
  • 8
    • 84867248592 scopus 로고
    • Untraceable off-line cash in wallet with observers
    • Springer-Verlag
    • S. Brands, "Untraceable off-line cash in wallet with observers," in Proc. Advances in Cryptology-Crypto 1993 (LNCS 773), 1993, pp. 302-318, Springer-Verlag.
    • (1993) Proc. Advances in Cryptology-Crypto 1993 (LNCS 773) , pp. 302-318
    • Brands, S.1
  • 9
    • 84879548704 scopus 로고    scopus 로고
    • Optimistic asynchronous multi-party contract signing with reduced number of rounds
    • Automata, Languages and Programming
    • B. Baum-Waidner, "Optimistic asynchronous multi-party contract signing with reduced number of rounds," in Proc. ICALP 2001, LNCS 2076, Berlin, Heidelberg, New York, 2001, pp. 898-911, Springer. (Pubitemid 33300856)
    • (2001) Lecture Notes in Computer Science , Issue.2076 , pp. 898-911
    • Baum-Waidner, B.1
  • 10
    • 0031682832 scopus 로고    scopus 로고
    • Efficient and practical fair exchange protocols with off-Line TTP
    • IEEE Computer Society Press
    • F. Bao, R. Deng, and W. Mao, "Efficient and practical fair exchange protocols with off-Line TTP," in Proc. IEEE Symp. Research in Security and Privacy, 1998, pp. 77-85, IEEE Computer Society Press.
    • (1998) Proc. IEEE Symp. Research in Security and Privacy , pp. 77-85
    • Bao, F.1    Deng, R.2    Mao, W.3
  • 11
    • 84937441148 scopus 로고
    • Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
    • Springer-Verlag
    • J. Camenisch and I. Damgård, "Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes," in Proc. Advances in Cryptology-Asiacrypt 2000 (LNCS 1976), 2000, pp. 331-345, Springer-Verlag.
    • (1976) Proc. Advances in Cryptology-Asiacrypt 2000 (LNCS) , vol.2000 , pp. 331-345
    • Camenisch, J.1    Damgård, I.2
  • 12
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, "A signature scheme with efficient protocols," in Proc. SCN 2002, LNCS 2576, 2003, pp. 268-289, Springer-Verlag.
    • (2003) Proc. SCN 2002, LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 17
    • 84860404630 scopus 로고    scopus 로고
    • Conditional e-payments with transferability
    • Elsevier
    • B. Carbunar, L. Shi, and R. Sion, "Conditional e-payments with transferability," J. Parallel Distrib. Comput., vol. 71, no. 1, pp. 16-26, 2011, Elsevier.
    • (2011) J. Parallel Distrib. Comput , vol.71 , Issue.1 , pp. 16-26
    • Carbunar, B.1    Shi, L.2    Sion, R.3
  • 18
    • 58449123075 scopus 로고    scopus 로고
    • Conditioal payments for computing markets
    • Springer-Verlag
    • B. Carbunar and M. Tripunitara, "Conditioal payments for computing markets," in Proc. CANS 2008, LNCS 5339, 2008, pp. 317-331, Springer-Verlag.
    • (2008) Proc. CANS 2008, LNCS , vol.5339 , pp. 317-331
    • Carbunar, B.1    Tripunitara, M.2
  • 20
    • 77955325308 scopus 로고    scopus 로고
    • Threeround abuse-free optimistic contract signing with everlasting secrecy
    • Springer-Verlag
    • X.Chen, F. Zhang, H. Tian,Q.Wu, Y.Mu, J.Kim, andK. Kim, "Threeround abuse-free optimistic contract signing with everlasting secrecy," in Proc. FC 2010, LNCS 6052, 2010, pp. 304-311, Springer-Verlag.
    • (2010) Proc. FC 2010, LNCS , vol.6052 , pp. 304-311
    • Chen, X.1    Zhang, F.2    Wu, Q.3    Tian, H.4    Mu, Y.5    Kim, J.6    Kim, K.7
  • 21
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • Springer, Berlin, Heidelberg, New York
    • I. Damgåard, "Practical and provably secure release of a secret and exchange of signatures," J. Cryptology, vol. 8, no. 4, pp. 201-222, 1995, Springer, Berlin, Heidelberg, New York.
    • (1995) J. Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgåard, I.1
  • 23
    • 0030246312 scopus 로고    scopus 로고
    • Practical protocol for certified electronic mail
    • R. H. Deng, L. Gong, A. Lazar, and W. Wang, "Practical protocol for certified electronic mail," J. Netw. Syst. Manage., vol. 4, no. 3, pp. 279-297, 1996.
    • (1996) J. Netw. Syst. Manage , vol.4 , Issue.3 , pp. 279-297
    • Deng, R.H.1    Gong, L.2    Lazar, A.3    Wang, W.4
  • 24
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, pp. 637-647, 1985.
    • (1985) Commun ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 27
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable distributed computations
    • Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
    • P. Golle and I. Mironov, "Uncheatable distributed computations," in Proc. CT-RSA 2001, LNCS 2020, 2001, pp. 425-440, Springer-Verlag. (Pubitemid 33255180)
    • (2001) Lecture notes in Computer Science , Issue.2020 , pp. 425-440
    • Golle, P.1    Mironov, I.2
  • 28
    • 84949235873 scopus 로고    scopus 로고
    • Secure distributed computing in a commercial environment
    • Springer-Verlag
    • P. Golle and S. G. Stubblebine, "Secure distributed computing in a commercial environment," in Proc. FC 2001, LNCS 2339, 2001, pp. 289-304, Springer-Verlag.
    • (2001) Proc. FC 2001, LNCS , vol.2339 , pp. 289-304
    • Golle, P.1    Stubblebine, S.G.2
  • 33
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over and its crytographic significance
    • Jan
    • S. C. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over and its crytographic significance," IEEE Trans. Inf. Theory, vol. IT-24, no. 1, pp. 106-110, Jan. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.1 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 34
    • 0036499242 scopus 로고    scopus 로고
    • Sabotage-tolerance mechanisms for volunteer computing systems
    • DOI 10.1016/S0167-739X(01)00077-2, PII S0167739X01000772
    • L. F. G. Sarmenta, "Sabotage-tolerance mechanisms for volunteer computing systems," Future Generation Computer Systems: Special Issue on Cluster Computing and the Grid, vol. 18, pp. 561-572, 2002. (Pubitemid 34181832)
    • (2002) Future Generation Computer Systems , vol.18 , Issue.4 , pp. 561-572
    • Sarmenta, L.F.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.