메뉴 건너뛰기




Volumn 2271, Issue , 2002, Pages 277-289

Securing “encryption + proof of knowledge” in the random oracle model

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS;

EID: 84944891017     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45760-7_19     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 2
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Association for Computing Machinery
    • M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In First ACM Conference on Computer and Communication Security, pages 62–73. Association for Computing Machinery, 1993.
    • (1993) First ACM Conference on Computer and Communication Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • H. Krawczyk, editor, Springer-Verlag
    • R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptology – CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, pages 13–25. Springer-Verlag, 1998.
    • (1998) Advances in Cryptology – CRYPTO’98, Volume 1462 of Lecture Notes in Computer Science , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 6
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • G. R. Blakley and D. Chaum, editors, Springer-Verlag
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. Chaum, editors, Advances in Cryptology – CRYPTO’84, volume 196 of Lecture Notes in Computer Science, pages 10–18. Springer-Verlag, 1985.
    • (1985) Advances in Cryptology – CRYPTO’84, Volume 196 of Lecture Notes in Computer Science , pp. 10-18
    • Elgamal, T.1
  • 10
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281–308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 11
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • C. G. Günther, editor, Springer-Verlag
    • L. C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In C. G. Günther, editor, Advances in Cryptology – EUROCRYPT’88, volume 330 of Lecture Notes in Computer Science, pages 123–128. Springer-Verlag, 1988.
    • (1988) Advances in Cryptology – EUROCRYPT’88, Volume 330 of Lecture Notes in Computer Science , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 13
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • Springer-Verlag
    • T. Okamoto and D. Pointscheval. The gap-problems: a new class of problems for the security of cryptographic schemes. In PKC 2001, Lecture Notes in Computer Science. Springer-Verlag, 2001.
    • (2001) PKC 2001, Lecture Notes in Computer Science.
    • Okamoto, T.1    Pointscheval, D.2
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 18
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239–252, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 22


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.