메뉴 건너뛰기




Volumn 1992, Issue , 2001, Pages 383-401

Secure server-aided signature generation

Author keywords

Batch; Delegation; DSS; Duplication; Error detection

Indexed keywords

AUTHENTICATION; CHROMIUM COMPOUNDS; COMPUTATION THEORY; COMPUTATIONAL METHODS; ERROR DETECTION;

EID: 84937432284     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44586-2_28     Document Type: Conference Paper
Times cited : (43)

References (35)
  • 2
    • 84958948483 scopus 로고    scopus 로고
    • Hiding Instances in Zero-Knowledge Proof Systems
    • D. Beaver, J. Feigenbaum and V. Shoup, “Hiding Instances in Zero-Knowledge Proof Systems,” CRYPTO’90, pp. 326–338.
    • CRYPTO’90 , pp. 326-338
    • Beaver, D.1    Feigenbaum, J.2    Shoup, V.3
  • 3
    • 50849114523 scopus 로고    scopus 로고
    • Fast Batch Verification for Modular Exponentiation and Digital Signatures
    • M. Bellare, J.A. Garay and T. Rabin, “Fast Batch Verification for Modular Exponentiation and Digital Signatures,” EUROCRYPT’98, 1998, pp. 236–250.
    • (1998) EUROCRYPT’98 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 4
    • 84898960610 scopus 로고    scopus 로고
    • Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations
    • M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations”, STOC’88, pp. 1–10.
    • STOC’88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 0000742754 scopus 로고    scopus 로고
    • Addition Chain Heuristics
    • J. Bos and M. Coster, “Addition Chain Heuristics,” CRYPTO’89, pp. 400–407.
    • CRYPTO’89 , pp. 400-407
    • Bos, J.1    Coster, M.2
  • 7
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputations
    • V. Boyko, M. Peinado and R. Venkatesan, “Speeding up discrete log and factoring based schemes via precomputations. EUROCRYPT’98, pp. 221–235.
    • EUROCRYPT’98 , pp. 221-235
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 8
    • 84867248592 scopus 로고    scopus 로고
    • Untraceable Off-line Cash in Wallet with Observers
    • S. Brands, “Untraceable Off-line Cash in Wallet with Observers,” CRYPTO’93, pp. 302–318.
    • CRYPTO’93 , pp. 302-318
    • Brands, S.1
  • 9
    • 0028381806 scopus 로고
    • Parameter Selection for Server-Aided RSA Computation Schemes
    • J. Burns and C.J. Mitchell, “Parameter Selection for Server-Aided RSA Computation Schemes” IEEE Transactions on Computers, Vol. 43, No. 2, 1994, pp. 163–174.
    • (1994) IEEE Transactions on Computers , vol.43 , Issue.2 , pp. 163-174
    • Burns, J.1    Mitchell, C.J.2
  • 10
    • 84898947315 scopus 로고    scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • D. Chaum, C. Crépeau and I. Damgård, “Multiparty Unconditionally Secure Protocols”, STOC’98, pp. 11–19.
    • STOC’98 , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 15
    • 84948958135 scopus 로고    scopus 로고
    • How to Break a Practical MIX and Design a New One
    • Y. Desmedt and K. Kurosawa, “How to Break a Practical MIX and Design a New One,” EUROCRYPT’00, pp. 557–772.
    • EUROCRYPT’00 , pp. 557-772
    • Desmedt, Y.1    Kurosawa, K.2
  • 16
    • 84948968588 scopus 로고    scopus 로고
    • A Note on One-Prover Instance-Hiding, Zero- Knowledge Proof Systems
    • J. Feigenbaum and R. Ostrovsky, “A Note on One-Prover Instance-Hiding, Zero- Knowledge Proof Systems”, ASIACRYPT’91, pp. 352–359.
    • ASIACRYPT’91 , pp. 352-359
    • Feigenbaum, J.1    Ostrovsky, R.2
  • 18
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography
    • R. Gennaro, M. Rabin and T. Rabin, “Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography”, PODC’98, pp. 101–111.
    • PODC’98 , pp. 101-111
    • Gennaro, R.1    Rabin, M.2    Rabin, T.3
  • 20
  • 21
    • 0027617773 scopus 로고
    • Fast Server-Aided Secret Computation Protocols for Modular Exponentiation
    • S. Kawamura and A. Shimbo, “Fast Server-Aided Secret Computation Protocols for Modular Exponentiation”, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pp. 778–784.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 22
    • 84957648348 scopus 로고    scopus 로고
    • Security and Performance of Server-Aided RSA Computation Protocols
    • C.H. Lim and P.J. Lee, “Security and Performance of Server-Aided RSA Computation Protocols,” CRYPTO’95, pp. 70–83.
    • CRYPTO’95 , pp. 70-83
    • Lim, C.H.1    Lee, P.J.2
  • 23
    • 84955368946 scopus 로고    scopus 로고
    • More Flexible Exponentiation With Precomputation
    • C.H. Lim and P.J. Lee, “More Flexible Exponentiation With Precomputation”, CRYPTO’94, pp. 95–107.
    • CRYPTO’94 , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 24
    • 21344491195 scopus 로고    scopus 로고
    • On Verifiable Implicit Asking Protocols for RSA Computation
    • T. Matsumoto, H. Imai, C.S. Laih and S.M. Yen, “On Verifiable Implicit Asking Protocols for RSA Computation”, AUSCRYPT’92, pp. 296–307.
    • AUSCRYPT’92 , pp. 296-307
    • Matsumoto, T.1    Imai, H.2    Laih, C.S.3    Yen, S.M.4
  • 25
    • 85031767993 scopus 로고    scopus 로고
    • Speeding Up Secret Computations with Insecure Auxiliary Devices
    • T. Matsumoto, K. Kato and H. Imai, “Speeding Up Secret Computations with Insecure Auxiliary Devices”, CRYPTO’88, pp. 497–506.
    • CRYPTO’88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 26
    • 84937478347 scopus 로고    scopus 로고
    • FIPS Publication 186-1: Digital Signature Standard
    • National Institute of Standards and Technology (NIST), “FIPS Publication 186-1: Digital Signature Standard”, December 15, 1998.
    • (1998) December , pp. 15
  • 27
    • 84957072857 scopus 로고    scopus 로고
    • The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications
    • P. Nguyen and J. Stern, “The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications”, Crypto’99, pp. 31–46.
    • Crypto’99 , pp. 31-46
    • Nguyen, P.1    Stern, J.2
  • 28
    • 84955578798 scopus 로고    scopus 로고
    • Attacks on Protocols for Server-Aided RSA Computation
    • B. Pfitzmann and M. Waidner, “Attacks on Protocols for Server-Aided RSA Computation”, EUROCRYPT’92, pp. 153–162.
    • EUROCRYPT’92 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 29
    • 0005063381 scopus 로고    scopus 로고
    • Speeding up Smart Card RSA Computation with Insecure Coprocessors
    • J.-J. Quisquater and M. De Soete, “Speeding up Smart Card RSA Computation with Insecure Coprocessors”, SMART CARD 2000, 1989, pp. 191–197.
    • (2000) SMART CARD , vol.1989 , pp. 191-197
    • Quisquater, J.-J.1    De Soete, M.2
  • 31
    • 0033309271 scopus 로고    scopus 로고
    • Non-Interactive Crypto Computing for NC1
    • T. Sander, A. Young and M. Yung, “Non-Interactive Crypto Computing for NC1”, FOCS’99, pp. 554–567.
    • FOCS’99 , pp. 554-567
    • Sander, T.1    Young, A.2    Yung, M.3
  • 32
    • 12344258539 scopus 로고
    • Efficient Signature Generation for Smart Cards
    • C.-P. Schnorr, “Efficient Signature Generation for Smart Cards,” Journal of Cryptology, Vol. 4, 1991, pp. 161–174.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.-P.1
  • 33
    • 33846200465 scopus 로고
    • Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems
    • C.P. Schnorr and M. Euchner, “Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems”, Mathematical Programming 66, 1994, pp. 181–199.
    • (1994) Mathematical Programming , vol.66 , pp. 181-199
    • Schnorr, C.P.1    Euchner, M.2
  • 34
    • 0009452048 scopus 로고    scopus 로고
    • Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction
    • C.P. Schnorr and H.H. Hörner, “Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction”, EUROCRYPT’95, pp. 1–12.
    • EUROCRYPT’95 , pp. 1-12
    • Schnorr, C.P.1    Hörner, H.H.2
  • 35
    • 0020312165 scopus 로고    scopus 로고
    • Protocols for Secure Computations
    • A.C. Yao, “Protocols for Secure Computations”, FOCS’82, pp. 160–164.
    • FOCS’82 , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.