메뉴 건너뛰기




Volumn 1294, Issue , 1997, Pages 395-409

Efficient anonymous multicast and reception

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; POLYNOMIALS;

EID: 84937578372     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0052251     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 0041937636 scopus 로고    scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • M. Blum and S. Goldwassei, "An efficient probabilistic public-key encryption scheme which hides all partial information", CRYPTO 84
    • CRYPTO 84
    • Blum, M.1    Goldwassei, S.2
  • 2
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • M. Blum, and S. Micali "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits", FOCS 82 and SIAM J. on Computing, Vol 13, 1984, pp. 850-864.
    • (1984) FOCS 82 and SIAM J. on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 3
    • 84898960610 scopus 로고    scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-or, S. Goldwasser, and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", STOC 88.
    • STOC 88
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communication of the ACM, vol. 24, no. 2 (1981), pp. 84-88.
    • (1981) Communication of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 8
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
    • D. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", Journal of Cryptology, vol. 1 (1988), pp. 65-75.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 9
    • 0027005999 scopus 로고
    • Achieving Electronic Privacy
    • D. Chaum, "Achieving Electronic Privacy", Scientific American, vol. 267, no. 2 (1992), pp. 96-101.
    • (1992) Scientific American , vol.267 , Issue.2 , pp. 96-101
    • Chaum, D.1
  • 10
    • 0027805770 scopus 로고    scopus 로고
    • Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems
    • M. Franklin, Z. Galil and M. Yung "Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems," FOCS 93.
    • FOCS 93
    • Franklin, M.1    Galil, Z.2    Yung, M.3
  • 12
    • 84969331532 scopus 로고    scopus 로고
    • Pseudo-Random Generators under Uniform Assumptions
    • J. Hastad, "Pseudo-Random Generators under Uniform Assumptions", STOC 90.
    • STOC 90
    • Hastad, J.1
  • 13
  • 14
    • 0038647741 scopus 로고    scopus 로고
    • Reducibility and Completeness in Multi-Party Private Computations
    • E. Kushilevitz, S. Micali, and R. Ostrovsky, "Reducibility and Completeness in Multi-Party Private Computations", FOCS 94.
    • FOCS 94
    • Kushilevitz, E.1    Micali, S.2    Ostrovsky, R.3
  • 16
    • 0023331864 scopus 로고
    • Network without User Observability
    • A. Pfitzmann, M. Waidner, "Network without User Observability," Computer & Security 6 (1987) 158-166.
    • (1987) Computer & Security , vol.6 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 19
    • 6244294214 scopus 로고    scopus 로고
    • The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability
    • M. Waidner and B. Pfitzmann, "The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability Eurocrypt 89.
    • Eurocrypt 89
    • Waidner, M.1    Pfitzmann, B.2
  • 20
    • 0027224328 scopus 로고    scopus 로고
    • Cryptographic Defense Against Traffic Analysis
    • C. Rackoff and D. Simon, "Cryptographic Defense Against Traffic Analysis", STOC 93
    • STOC 93
    • Rackoff, C.1    Simon, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.