메뉴 건너뛰기




Volumn 2442, Issue , 2002, Pages 499-514

SiBIR: Signer-base intrusion-resilient signatures

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84937422774     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45708-9_32     Document Type: Conference Paper
Times cited : (116)

References (26)
  • 1
    • 60649120007 scopus 로고    scopus 로고
    • Forward-secure threshold signature schemes
    • AMN01, In David Naccache, editor
    • AMN01. Michel Abdalla, Sara Miner, and Chanathip Namprempre. Forward-secure threshold signature schemes. In David Naccache, editor, Progress in Cryptology – CT-RSA 2001, Lecture Notes in Computer Science2020, 2001
    • (2001) Progress in Cryptology – CT-RSA 2001
    • Abdalla, M.1    Miner, S.2    Namprempre, C.3
  • 2
    • 84937472071 scopus 로고    scopus 로고
    • Invited lecture
    • And97
    • And97. Ross Anderson. Invited lecture. Fourth Annual Conference on Computer and Communications Security, ACM, 1997
    • (1997) ACM
    • Anderson, R.1
  • 3
    • 79958074367 scopus 로고    scopus 로고
    • BM99, In Michael Wiener, editor, Advances in Cryptology – CRYPTO ’99, ofLecture Notes in Computer Science, Springer-Verlag, 15–19 August, Revised version is available from
    • BM99. Mihir Bellare and Sara Miner. A forward-secure digital signature scheme In Michael Wiener, editor, Advances in Cryptology – CRYPTO ’99, volume 1666 of Lecture Notes in Computer Science, pages 431–448 Springer-Verlag, 15–19 August 1999. Revised version is available from http://www.cs.ucsd.edu/˜mihir/
    • (1999) A Forward-Secure Digital Signature Scheme , vol.1666 , pp. 431-448
    • Bellare, M.1    Miner, S.2
  • 4
    • 84957360970 scopus 로고    scopus 로고
    • BP97, Walter Fumy, editor, Advances in Cryptology – EUROCRYPT 97, ofLecture Notes in Computer Science, Springer-Verlag, 11–15 May
    • BP97. Niko Bari´c and Birgit Pfitzmann. Collision-free accumulators and failstop signature schemes without trees. In Walter Fumy, editor, Advances in Cryptology – EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 480–494. Springer-Verlag, 11–15 May 1997
    • (1997) Collision-Free Accumulators and Failstop Signature Schemes without Trees , vol.1233 , pp. 480-494
    • Niko, B.1    Pfitzmann, B.2
  • 6
    • 85023809951 scopus 로고
    • DF89, G. Brassard, editor, Advances in Cryptology – CRYPTO ’89, ofLecture Notes in Computer Science, Springer-Verlag
    • DF89. Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology – CRYPTO ’89, volume 435 of Lecture Notes in Computer Science, pages 307–315. Springer-Verlag, 1990
    • (1990) Threshold Cryptosystems , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 8
    • 3142521500 scopus 로고    scopus 로고
    • DKXY02, In Lars Knudsen, editor, Advances in Cryptology – EUROCRYPT 2002, Lecture Notes in Computer Science Springer-Verlag, 28 April–2 May
    • DKXY02. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. Keyinsulated public key cryptosystems. In Lars Knudsen, editor, Advances in Cryptology – EUROCRYPT 2002, Lecture Notes in Computer Science Springer-Verlag, 28 April–2 May 2002
    • (2002) Keyinsulated Public Key Cryptosystems
    • Dodis, Y.1    Katz, J.2    Shouhuai, X.3    Yung, M.4
  • 9
    • 84958615646 scopus 로고    scopus 로고
    • FO97, ofLecture Notes in Computer Science, Springer-Verlag, 17–21 August
    • FO97. Eiichiro Fujisaki and Tatsuaki Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Burton S. Kaliski Jr., editor, Advances in Cryptology – CRYPTO ’97, volume 1294 of Lecture Notes in Computer Science, pages 16–30. Springer-Verlag, 17–21 August 1997
    • (1997) Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • GMR88
    • GMR88. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281–308, April 1988
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 13
    • 84957707067 scopus 로고    scopus 로고
    • GPR98, Hugo Krawczyk, editor, Advances in Cryptology – CRYPTO ’98, ofLecture Notes in Computer Science, Springer-Verlag, 23–27 August
    • GPR98. Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest. Self-delegation with controlled propagation – or – what if you lose your laptop. In Hugo Krawczyk, editor, Advances in Cryptology – CRYPTO ’98, volume 1462 of Lecture Notes in Computer Science, pages 153–168. Springer-Verlag, 23–27 August 1998
    • (1998) Self-Delegation with Controlled Propagation – Or – What If You Lose Your Laptop , vol.1462 , pp. 153-168
    • Goldreich, O.1    Pfitzmann, B.2    Rivest, R.L.3
  • 14
    • 84947558992 scopus 로고
    • GQ88, Shafi Goldwasser, editor, Advances in Cryptology – CRYPTO ’88, ofLecture Notes in Computer Science, Springer-Verlag
    • GQ88. Louis Claude Guillou and Jean-Jacques Quisquater. A “paradoxical” indentity-based signature scheme resulting from zero-knowledge. In Shafi Goldwasser, editor, Advances in Cryptology – CRYPTO ’88, volume 403 of Lecture Notes in Computer Science, pages 216–231. Springer-Verlag, 1990
    • (1990) A “paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge , vol.403 , pp. 216-231
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 15
    • 0030646698 scopus 로고    scopus 로고
    • HJJ+97. Amir Herzberg, Markus Jakobsson, Stanis_law Jarecki, Hugo Krawczyk, and Moti Yung, Fourth ACM Conference on Computer and Communication Security, ACM, April 1–4
    • HJJ+97. Amir Herzberg, Markus Jakobsson, Stanis_law Jarecki, Hugo Krawczyk, and Moti Yung. Proactive public key and signature systems. In Fourth ACM Conference on Computer and Communication Security, pages 100– 110. ACM, April 1–4 1997
    • (1997) Proactive Public Key and Signature Systems
  • 16
    • 84880879872 scopus 로고    scopus 로고
    • IR01, Joe Kilian, editor, Advances in Cryptology – CRYPTO 2001,, ofLecture Notes in Computer Science, Springer-Verlag, 19–23 August
    • IR01. Gene Itkis and Leonid Reyzin. Forward-secure signatures with optimal signing and verifying. In Joe Kilian, editor, Advances in Cryptology – CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 332–354. Springer-Verlag, 19–23 August 2001
    • (2001) Forward-Secure Signatures with Optimal Signing and Verifying , vol.2139 , pp. 332-354
    • Itkis, G.1    Reyzin, L.2
  • 18
    • 84937472075 scopus 로고    scopus 로고
    • LR00, Presented by Rivest at the CIS seminar at MIT, 27 October
    • LR00. Anna Lysyanskaya and Ron Rivest. Bepper-based signatures. Presented by Rivest at the CIS seminar at MIT, 27 October 2000
    • (2000) Bepper-Based Signatures
    • Lysyanskaya, A.1    Rivest, R.2
  • 19
    • 0004179384 scopus 로고    scopus 로고
    • Mic96.,., Technical Report MIT/LCS/TM-542b, Massachusetts Institute of Technology, Cambridge, MA, March
    • Mic96. Silvio Micali. Efficient certificate revocation. Technical Report MIT/LCS/TM-542b, Massachusetts Institute of Technology, Cambridge, MA, March 1996
    • (1996) Efficient Certificate Revocation
    • Micali, S.1
  • 22
  • 23
    • 84927727752 scopus 로고    scopus 로고
    • PS96, Ueli Maurer, editor, Advances in Cryptology – EUROCRYPT 96, ofLecture Notes in Computer Science, Springer-Verlag, 12–16 May
    • PS96. David Pointcheval and Jacques Stern. Security proofs for signature schemes. In Ueli Maurer, editor, Advances in Cryptology – EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, pages 387–398. Springer-Verlag, 12–16 May 1996
    • (1996) Security Proofs for Signature Schemes , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 24
    • 84958042111 scopus 로고    scopus 로고
    • Riv98., Rafael Hirschfeld, editor, Financial Cryptograph, ofLecture Notes in Computer Science. Springer-Verlag
    • Riv98. Ronald L. Rivest. Can we eliminate certificate revocation lists? In Rafael Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science. Springer-Verlag, 1998
    • (1998) Can We Eliminate Certificate Revocation Lists? , vol.1465
    • Rivest, R.L.1
  • 25
    • 38049015677 scopus 로고
    • On the generation of cryptographically strong pseudorandom sequences
    • Sha83
    • Sha83. Adi Shamir. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, 1(1):38–44, 1983
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.1 , pp. 38-44
    • Shamir, A.1
  • 26
    • 0020312165 scopus 로고
    • Yao82, 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, 3–5 November, IEEE
    • Yao82. A.C. Yao. Protocols for secure computations. In 23rd Annual Symposium on Foundations of Computer Science, pages 160–164, Chicago, Illinois, 3–5 November 1982. IEEE
    • (1982) Protocols for Secure Computations , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.