메뉴 건너뛰기




Volumn 1992, Issue , 2001, Pages 240-263

Adaptive security for the additive-sharing based proactive RSA

Author keywords

[No Author keywords available]

Indexed keywords

ADDITIVES; PUBLIC KEY CRYPTOGRAPHY; SHAREHOLDERS;

EID: 84937432804     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44586-2_18     Document Type: Conference Paper
Times cited : (21)

References (44)
  • 1
    • 0023985196 scopus 로고
    • RSA and Rabin Functions: Certain Parts are as Hard as the Whole
    • April
    • W. Alexi, B. Chor, O. Goldreich and C. Schnorr.RSA and Rabin Functions: Certain Parts are as Hard as the Whole. In SIAM Journal of Computing, volume 17, n. 2, pages 194-209, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.4
  • 4
    • 0010364857 scopus 로고
    • Tech. Report No. UCB/CSD 84/186. Computer Science Division (EECS), University of California, Berkeley, CA. June
    • E. Bach, Discrete Logarithms and Factoring. Tech. Report No. UCB/CSD 84/186. Computer Science Division (EECS), University of California, Berkeley, CA. June 1984.
    • (1984) Discrete Logarithms and Factoring.
    • Bach, E.1
  • 5
    • 33645593695 scopus 로고    scopus 로고
    • Plug and Play Encryption
    • D. Beaver, Plug and Play Encryption, Crypto 97, pp. 75-89.
    • Crypto , vol.97 , pp. 75-89
    • Beaver, D.1
  • 6
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • Springer-Verlag
    • D. Beaver and S. Haber, Cryptographic protocols provably secure against dynamic adversaries, EuroCrypt 92, Springer-Verlag, 1993, 307-323.
    • (1993) Eurocrypt 92 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 7
    • 85062838317 scopus 로고
    • Safeguarding Cryptographic Keys
    • G.R. Blakley, Safeguarding Cryptographic Keys, AFIPS Con. Proc (v. 48), 1979, 313-317.
    • (1979) AFIPS Con. Proc , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 9
    • 0002181960 scopus 로고
    • Digital Multisignatures
    • Claredon Press, (Eds. H. Baker and F. Piper)
    • C. Boyd, Digital Multisignatures, IMA Conference on Cryptography and Coding, Claredon Press, 241-246, (Eds. H. Baker and F. Piper), 1986.
    • (1986) IMA Conference on Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 10
    • 84958639277 scopus 로고    scopus 로고
    • Efficient Generation of Shared RSA Keys
    • D. Boneh and M. Franklin, Efficient Generation of Shared RSA Keys, Crypto 97, pp. 425-439.
    • Crypto 97 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 13
    • 84984842401 scopus 로고
    • Maintaining Security in the presence of transient faults
    • Springer-Verlag
    • R. Canetti and A. Herzberg, Maintaining Security in the presence of transient faults, Crypto 94, Springer-Verlag, 1994, pp.425-438.
    • (1994) Crypto 94 , pp. 425
    • Canetti, R.1    Herzberg, A.2
  • 14
    • 0000182415 scopus 로고
    • A Measure of the asymptotic efficiency for tests of a hypothesis based on the sum of observations
    • H. Chernoff, A Measure of the asymptotic efficiency for tests of a hypothesis based on the sum of observations, Annals of Mathematical Statistics, 23:493-509, 1952.
    • (1952) Annals of Mathematical Statistics , vol.23 , pp. 493
    • Chernoff, H.1
  • 15
    • 0022188127 scopus 로고    scopus 로고
    • A robust and verifiable cryptographically secure election scheme
    • J. Cohen and M. Fischer, A robust and verifiable cryptographically secure election scheme, FOCS 85.
    • FOCS 85
    • Cohen, J.1    Fischer, M.2
  • 16
    • 0027961556 scopus 로고    scopus 로고
    • How to Share a Function Securely
    • First version May 9
    • De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, ACM STOC 94, pp. 522-533. (First version May 92).
    • ACM STOC 94 , pp. 522-533
    • De Santisdesmedt, Y.1    Frankel, Y.2    Yung, M.3
  • 18
    • 0000266745 scopus 로고
    • Shared generation of authenticators and signatures
    • Springer-Verlag LNCS 576
    • Y. Desmedt and Y. Frankel, Shared generation of authenticators and signatures, Crypto 91, Springer-Verlag LNCS 576, 1992, pp. 307-315.
    • (1992) Crypto 91 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 19
    • 0023538330 scopus 로고
    • A Practical Scheme for Non-Interactive Verifiable Secret Sharing
    • P. Feldman, A Practical Scheme for Non-Interactive Verifiable Secret Sharing, Proc. of the 28th IEEE FOCS, pp. 427-437, 1987
    • (1987) Proc. Of the 28Th IEEE FOCS , pp. 427-437
    • Feldman, P.1
  • 20
    • 0039241746 scopus 로고    scopus 로고
    • A practical protocol for large group oriented networks
    • Springer-Verlag LNCS 773
    • Y. Frankel, A practical protocol for large group oriented networks, Euro-crypt’89, Springer-Verlag LNCS 773, pp. 56-61.
    • Euro-crypt’89 , pp. 56-61
    • Frankel, Y.1
  • 21
  • 22
    • 0029713931 scopus 로고    scopus 로고
    • Witness-based Cryptographic Program Checking and Robust Function Sharing
    • Y. Frankel, P. Gemmell, and M. Yung, Witness-based Cryptographic Program Checking and Robust Function Sharing Proc. of STOC, 1996, pp. 499-508.
    • (1996) Proc. Of STOC , pp. 499-508
    • Frankel, Y.1    Gemmell, P.2    Yung, M.3
  • 25
    • 84937412626 scopus 로고    scopus 로고
    • Adaptively-secure distributed public-key systems
    • Y. Frankel, P. D. MacKenzie, and M. Yung. Adaptively-secure distributed public-key systems. ESA 99, July 99.
    • ESA 99 , Issue.July , pp. 99
    • Frankel, Y.1    Mackenzie, P.D.2    Yung, M.3
  • 29
    • 2442649276 scopus 로고    scopus 로고
    • Secure and Efficient Digital Coin
    • Springer Verlag LNCS
    • M. Franklin and M. Yung, Secure and Efficient Digital Coin, ICALP 93, Springer Verlag LNCS.
    • ICALP 93
    • Franklin, M.1    Yung, M.2
  • 30
    • 0024716009 scopus 로고
    • Minimum-Knowledge Interactive Proofs for Decision Problems
    • Previous version in FOCS 85
    • Z. Galil, S. Haber, and M. Yung, Minimum-Knowledge Interactive Proofs for Decision Problems, SIAM Journal on Computing, vol. 18, n.4, pp. 711-739, 1989. (Previous version in FOCS 85).
    • (1989) SIAM Journal on Computing , vol.18 , Issue.4 , pp. 711-739
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 34
    • 84937429651 scopus 로고    scopus 로고
    • How to Cope with Perpetual Leakage, or: Proactive Secret Sharing
    • Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, How to Cope with Perpetual Leakage, or: Proactive Secret Sharing, Crypto 95, pp. 339-352.
    • Crypto , vol.95 , pp. 339-352
    • Herzbergjarecki, S.1    Krawczyk, H.2    Yung, M.3
  • 37
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
    • S. Jarecki and A. Lysyanskaya, Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. In Eurocrypt 2000, pp. 221-242.
    • (2000) In Eurocrypt , pp. 221-242
    • Jarecki, S.1    Lysyanskaya, A.2
  • 40
    • 84982943258 scopus 로고    scopus 로고
    • Non-interactive and information theoretic secure verifiable secret sharing
    • T.P. Pedersen, Non-interactive and information theoretic secure verifiable secret sharing, Crypto 91, pp. 129-140.
    • Crypto , vol.91 , pp. 129-140
    • Pedersen, T.P.1
  • 41
    • 84957689308 scopus 로고    scopus 로고
    • A Simplified Approach to Threshold and Proactive RSA
    • T. Rabin. A Simplified Approach to Threshold and Proactive RSA. In Crypto 98, pp. 89-104.
    • In Crypto 98 , pp. 89-104
    • Rabin, T.1
  • 42
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signature and Public Key Cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of the ACM, 21 (1978), pp. 120-126.
    • (1978) Comm. Of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 43
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir. How to share a secret, Comm. of the ACM, 22 (1979), pp. 612-613.
    • (1979) Comm. Of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 44
    • 84948954277 scopus 로고    scopus 로고
    • Practical Threshold Signatures
    • V. Shoup. Practical Threshold Signatures. In Eurocrypt 2000, pp. 207-220.
    • (2000) In Eurocrypt , pp. 207-220
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.