메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 130-149

Unconditionally secure digital signature schemes admitting transferability

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; DIGITAL DEVICES; NETWORK SECURITY; NUMBER THEORY; QUANTUM COMPUTERS;

EID: 84937409531     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_11     Document Type: Conference Paper
Times cited : (66)

References (31)
  • 1
    • 84957668600 scopus 로고
    • Quantum cryptanalysis of hidden linear functions
    • Springer-Verlag
    • D. Boneh and R. J. Lipton, “Quantum cryptanalysis of hidden linear functions,” Proc. of CRYPTO’95, LNCS 963, Springer-Verlag, pp.424-437, 1995.
    • (1995) Proc. Of CRYPTO’95, LNCS 963 , pp. 424-437
    • Boneh, D.1    Lipton, R.J.2
  • 2
    • 85017093546 scopus 로고
    • Authentication codes with multiple arbiters
    • Springer-Verlag
    • E. F. Brickell and D. R. Stinson, “Authentication codes with multiple arbiters,” Proc. of Eurocrypt’88, LNCS 330, Springer-Verlag, pp.51-55, 1988.
    • (1988) Proc. Of Eurocrypt’88, LNCS 330 , pp. 51-55
    • Brickell, E.F.1    Stinson, D.R.2
  • 4
    • 84988897099 scopus 로고
    • Unconditionally secure digital signatures
    • Springer-Verlag
    • D. Chaum and S. Roijakkers, “Unconditionally secure digital signatures,” Proc. of CRYPTO’90, LNCS 537, Springer-Verlag, pp.206-215, 1990.
    • (1990) Proc. Of CRYPTO’90, LNCS 537 , pp. 206-215
    • Chaum, D.1    Roijakkers, S.2
  • 5
    • 84947955350 scopus 로고
    • Cryptographically strong undeniable signatures, unconditionally secure for the signer
    • Springer-Verlag
    • D. Chaum, E. Heijst and B. Pfitzmann, “Cryptographically strong undeniable signatures, unconditionally secure for the signer,” Proc. of CRYPTO’91, LNCS 576, Springer-Verlag, pp.470-484, 1991.
    • (1991) Proc. Of CRYPTO’91, LNCS 576 , pp. 470-484
    • Chaum, D.1    Heijst, E.2    Pfitzmann, B.3
  • 7
    • 85027188625 scopus 로고
    • Arbitrated unconditionally secure authentication can be unconditionally protected against arbiters attack,”
    • Springer-Verlag
    • Y. Desmedt and M. Yung, “Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attack,” Proc. of CRYPTO’90, LNCS 537, Springer-Verlag, pp.177-188, 1990.
    • (1990) Proc. Of CRYPTO’90, LNCS 537 , pp. 177-188
    • Desmedt, Y.1    Yung, M.2
  • 8
    • 0026992399 scopus 로고
    • “Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
    • Federal Register
    • Y. Desmedt, Y. Frankel and M. Yung, “Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback,” Proc. of IEEE Infocom’92, pp.2045-2054, 1992. 9.
    • (1992) Proc. Of IEEE Infocom , vol.92 , pp. 2045-2054
    • Desmedt, Y.1    Frankel, Y.2    Yung, M.3
  • 10
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. on Inform. Theory, IT-31, 4, pp.469-472, 1985.
    • (1985) IEEE Trans. On Inform. Theory, IT-31 , vol.4 , pp. 469-472
    • Elgamal, T.1
  • 11
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer-Verlag
    • A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” Proc. of CRYPTO’86, LNCS 263, Springer-Verlag, pp.186-194, 1986.
    • (1986) Proc. Of CRYPTO’86, LNCS 263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 13
    • 0028514178 scopus 로고
    • Lower bounds on the probability of deception in authentication with arbitration
    • T. Johansson, “Lower bounds on the probability of deception in authentication with arbitration”, IEEE Trans. Inform. Theory, IT-40, 5, pp.1573-1585, 1994.
    • (1994) IEEE Trans. Inform. Theory, IT-40 , vol.5 , pp. 1573-1585
    • Johansson, T.1
  • 14
    • 0001925043 scopus 로고    scopus 로고
    • Further results on asymmetric authentication schemes
    • T. Johansson, “Further results on asymmetric authentication schemes,” Information and Computation, 151, pp.100-133, 1999.
    • (1999) Information and Computation , vol.151 , pp. 100-133
    • Johansson, T.1
  • 15
    • 0347188281 scopus 로고
    • New bound on authentication code with arbitration
    • Springer-Verlag
    • K. Kurosawa, “New bound on authentication code with arbitration,” Proc. of CRYPTO’94, LNCS 839, Springer-Verlag, pp.140-149, 1994.
    • (1994) Proc. Of CRYPTO’94, LNCS 839 , pp. 140-149
    • Kurosawa, K.1
  • 16
    • 84957375261 scopus 로고
    • Combinatorial bounds for authentication codes with arbitration
    • Springer-Verlag
    • K. Kurosawa and S. Obana, “Combinatorial bounds for authentication codes with arbitration,” Proc. of Eurocrypt’95, LNCS 921, Springer-Verlag, pp.289-300, 1995.
    • (1995) Proc. Of Eurocrypt’95, LNCS 921 , pp. 289-300
    • Kurosawa, K.1    Obana, S.2
  • 17
    • 84937446460 scopus 로고
    • “Secure hash standard,” FIPS PUB 180-1, Department of Commerce, Washington D.C
    • NIST, “Secure hash standard,” FIPS PUB 180-1, Department of Commerce, Washington D.C., 1995.
    • (1995)
  • 18
    • 0842327113 scopus 로고    scopus 로고
    • A2-code = affine resolvable + BIBD
    • Springer-Verlag
    • S. Obana and K. Kurosawa, “A2-code = affine resolvable + BIBD,” Proc. of ICICS’97, LNCS 1334, Springer-Verlag, pp.118-129, 1997.
    • (1997) Proc. Of ICICS’97, LNCS 1334 , pp. 118-129
    • Obana, S.1    Kurosawa, K.2
  • 19
    • 0025207738 scopus 로고
    • A fast signature scheme based on congruential polynomial operations
    • T. Okamoto, “A fast signature scheme based on congruential polynomial operations,” IEEE Trans. on Inform. Theory, IT-36, 1, pp.47-53, 1990.
    • (1990) IEEE Trans. On Inform. Theory, IT-36 , vol.1 , pp. 47-53
    • Okamoto, T.1
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signature and public-key cryptosystems,” Communication of the ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Communication of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 22
    • 0012048998 scopus 로고    scopus 로고
    • Broadcast authentication in group communication
    • Springer-Verlag
    • R. Safavi-Naini and H. Wang, “Broadcast authentication in group communication,” Proc. of Asiacrypt’99, LNCS1716, Springer-Verlag, pp.399-411, 1999.
    • (1999) Proc. Of Asiacrypt’99, LNCS1716 , pp. 399-411
    • Safavi-Naini, R.1    Wang, H.2
  • 23
    • 0001531989 scopus 로고    scopus 로고
    • Multireceiver authentication codes: Models, bounds, constructions and extensions
    • R. Safavi-Naini and H. Wang, “Multireceiver authentication codes: models, bounds, constructions and extensions,” Information and Computation, 151, pp.148-172, 1999.
    • (1999) Information and Computation , vol.151 , pp. 148-172
    • Safavi-Naini, R.1    Wang, H.2
  • 24
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, 4, pp.161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.1
  • 25
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAMJ. Comp., 26, no.5, pp.1484-1509, 1997.
    • (1997) SIAMJ. Comp. , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 26
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • Springer-Verlag
    • G. J. Simmons, “Authentication theory/coding theory,” Proc. of CRYPTO’84, LNCS 196, Springer-Verlag, pp.411-431, 1984.
    • (1984) Proc. Of CRYPTO’84, LNCS 196 , pp. 411-431
    • Simmons, G.J.1
  • 27
    • 84920719029 scopus 로고
    • Message authentication with arbitration of transmitter/receiver disputes
    • Springer-Verlag
    • G. J. Simmons, “Message authentication with arbitration of transmitter/receiver disputes,” Proc. of Eurocyrpt’87, Springer-Verlag, pp.151-165, 1987.
    • (1987) Proc. Of Eurocyrpt’87 , pp. 151-165
    • Simmons, G.J.1
  • 28
    • 0025157340 scopus 로고
    • A Cartesian construction for unconditionally secure authentication codes that permit arbitration
    • G. J. Simmons, “A Cartesian construction for unconditionally secure authentication codes that permit arbitration,” Journal of Cryptology, 2, pp.77-104, 1990.
    • (1990) Journal of Cryptology , vol.2 , pp. 77-104
    • Simmons, G.J.1
  • 29
    • 84942520493 scopus 로고
    • “Near optimal unconditionally secure authentication
    • Springer-Verlag
    • R. Taylor, “Near optimal unconditionally secure authentication,” Proc. of Eurocyrpt’ 94, LNCS 950, Springer-Verlag, pp.244-253, 1994.
    • (1994) Proc. Of Eurocyrpt’ 94, LNCS 950 , pp. 244-253
    • Taylor, R.1
  • 30
    • 0842305614 scopus 로고    scopus 로고
    • A3-codes under collusion attacks, Proc. Of Asiacrypt
    • Springer-Verlag
    • Y. Wang and R. Safavi-Naini, “A3-codes under collusion attacks,” Proc. of Asiacrypt’ 99, LNCS 1716, Springer-Verlag, pp.390-398, 1999.
    • (1999) 99, LNCS 1716 , pp. 390-398
    • Wang, Y.1    Safavi-Naini, R.2
  • 31
    • 84985796228 scopus 로고
    • HAVAL - A one-way hashing algorithm with variable length of output
    • Springer-Verlag
    • Y. Zheng, J. Pieprzyk and J. Seberry, “HAVAL - A one-way hashing algorithm with variable length of output,” Proc. of Auscrypt’92, LNCS 718, Springer-Verlag, pp.83-104, 1993.
    • (1993) Proc. Of Auscrypt’92, LNCS 718 , pp. 83-104
    • Zheng, Y.1    Pieprzyk, J.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.