메뉴 건너뛰기




Volumn 2271, Issue , 2002, Pages 236-243

Transitive signature schemes

Author keywords

Digital signatures; Graphs; Public key cryptography; Transitive closure

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84944878224     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45760-7_16     Document Type: Conference Paper
Times cited : (100)

References (15)
  • 1
    • 0011560546 scopus 로고
    • The transitive reduction of a directed graph. SIAM
    • A. V. Aho, M. R. Garey, and J. D. Ullman. The transitive reduction of a directed graph. SIAM J. Comput., 1:131–137, 1972.
    • (1972) J. Comput , vol.1 , pp. 131-137
    • Aho, A.V.1    Garey, M.R.2    Ullman, J.D.3
  • 2
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Kaisa Nyberg, editor, Springer
    • Matt Blaze, Gerrit Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In Kaisa Nyberg, editor, Proceedings EUROCRYPT’98, pages 127–144. Springer, 1998.
    • (1998) Proceedings EUROCRYPT’98 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 3
    • 84947955350 scopus 로고
    • Cryptographically strong undeniable signatures, unconditionally secure for the signer
    • J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science No. 576
    • D. Chaum, E. van Heijst, and B. Pfitzmann. Cryptographically strong undeniable signatures, unconditionally secure for the signer. In J. Feigenbaum, editor, Proceedings CRYPTO’91, pages 470–484. Springer, 1992. Lecture Notes in Computer Science No. 576.
    • (1992) Proceedings CRYPTO’91 , pp. 470-484
    • Chaum, D.1    Van Heijst, E.2    Pfitzmann, B.3
  • 4
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • R. L. Rivest, A. Sherman, and D. Chaum, editors, New York, Plenum Press
    • David Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proceedings CRYPTO 82, pages 199–203, New York, 1983. Plenum Press.
    • (1983) Proceedings CRYPTO 82 , pp. 199-203
    • Chaum, D.1
  • 5
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030–1044, Oct 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 7
    • 85028450627 scopus 로고
    • Non-malleable cryptography
    • ACM
    • D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In Proc. STOC’91, pages 542–552. ACM, 1991.
    • (1991) Proc. STOC’91 , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 8
    • 85034638281 scopus 로고
    • Encrypting problem instances: Or…can you take advantage of someone without having to trust him?
    • H. C. Williams, editor, Springer, Lecture Notes in Computer Science No
    • Joan Feigenbaum. Encrypting problem instances: Or…can you take advantage of someone without having to trust him? In H. C. Williams, editor, Proceedings CRYPTO 85, pages 477–488. Springer, 1986. Lecture Notes in Computer Science No. 218.
    • (1986) Proceedings CRYPTO 85 , pp. 477-488
    • Feigenbaum, J.1
  • 10
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM, 17(2):281–308, April 1988.
    • (1988) SIAM , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 11
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • Springer, Lecture Notes in Computer Science No. 2271 (This Volume)
    • Robert Johnson, David Molnar, Dawn Song, and David Wagner. Homomorphic signature schemes. In Topics in Cryptology—CT-RSA 2002, pages 244–262. Springer, 2002. Lecture Notes in Computer Science No. 2271 (This Volume).
    • (2002) Topics in Cryptology—CT-RSA 2002 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 13
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science No. 576
    • T.P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Proceedings CRYPTO’91, pages 129–140. Springer, 1992. Lecture Notes in Computer Science No. 576.
    • (1992) Proceedings CRYPTO’91 , pp. 129-140
    • Pedersen, T.P.1
  • 14
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Academic Press
    • Ronald L. Rivest, Leonard Adleman, and Michael L. Dertouzos. On data banks and privacy homomorphisms. In R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 169–180. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 169-180
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.