메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 143-154

Designated verifier proofs and their applications

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84927752554     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_13     Document Type: Conference Paper
Times cited : (678)

References (35)
  • 2
    • 84898967539 scopus 로고
    • How to Sign Given Any Trapdoor Function
    • M. Bellare, S. Micali, "How to Sign Given Any Trapdoor Function," 20th Annual STOC, 1988, pp. 32-42.
    • (1988) 20th Annual STOC , pp. 32-42
    • Bellare, M.1    Micali, S.2
  • 3
    • 0028087488 scopus 로고
    • Receipt-Free Secret-Ballot Elections
    • J.C. Benaloh, D. Tuinstra, "Receipt-Free Secret-Ballot Elections," 26th Annual STOC, 1994, pp. 544-553.
    • (1994) 26th Annual STOC , pp. 544-553
    • Benaloh, J.C.1    Tuinstra, D.2
  • 17
    • 0024984004 scopus 로고
    • Witness Indistinguishable and Witness Hiding Protocols
    • U. Feige, A. Shamir, "Witness Indistinguishable and Witness Hiding Protocols," 22nd Annual STOC, 1990, p. 416-426.
    • (1990) 22nd Annual STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 21
    • 71149116146 scopus 로고
    • Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems
    • O. Goldreich, S. Micali, A. Widgerson, "Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems," Journal of the ACM, vol. 38, n. 1, 1991, pp. 691-729
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Widgerson, A.3
  • 23
    • 0017959977 scopus 로고
    • Secure Communication over Insecure Channels
    • R.C. Merkle, "Secure Communication over Insecure Channels," Communications of the ACM, v. 21, n. 4, 1978, pp. 294-299
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.C.1
  • 26
    • 0024867751 scopus 로고
    • Universal One-Way Hash Functions and their Cryptographic Application
    • M. Naor, M. Yung, "Universal One-Way Hash Functions and their Cryptographic Application," 21st Annual STOC, 1989, pp. 33-43
    • (1989) 21st Annual STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 33
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Feb
    • R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, v. 21, n. 2, Feb 1978, pp. 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 34
    • 84957356080 scopus 로고    scopus 로고
    • Receipt-Free Mix-Type Voting Scheme
    • K. Sako, J. Kilian, "Receipt-Free Mix-Type Voting Scheme," Eurocrypt'95, pp 393-403.
    • Eurocrypt'95 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 35
    • 0020312165 scopus 로고
    • Protocols for Secure Computations
    • A. Yao, "Protocols for Secure Computations," Proceedings of the 23rd FOCS, 1982, pp. 160-164
    • (1982) Proceedings of the 23rd FOCS , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.