메뉴 건너뛰기




Volumn 2045, Issue , 2001, Pages 136-151

A secure three-move blind signature scheme for polynomially many signatures

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC DATA INTERCHANGE; NETWORK SECURITY;

EID: 84945119655     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44987-6_9     Document Type: Conference Paper
Times cited : (68)

References (31)
  • 2
    • 84955599449 scopus 로고    scopus 로고
    • How to date blind signatures
    • Springer-Verlag
    • M. Abe and E. Fujisaki. How to date blind signatures. In Asiacrypt ‘96, LNCS 1163, pp. 244-251. Springer-Verlag, 1996.
    • (1996) Asiacrypt ‘96, LNCS 1163 , pp. 244-251
    • Abe, M.1    Fujisaki, E.2
  • 3
    • 84974652864 scopus 로고    scopus 로고
    • Provably secure partially blind signatures
    • Springer-Verlag
    • M. Abe and T. Okamoto. Provably secure partially blind signatures. In Crypto 2000, LNCS 1880, pp. 271-286. Springer-Verlag, 2000.
    • (2000) Crypto 2000, LNCS 1880 , pp. 271-286
    • Abe, M.1    Okamoto, T.2
  • 4
    • 84948986458 scopus 로고
    • Optimal asymmetricencryption
    • Springer-Verlag
    • M. Bellare and P. Rogaway. Optimal asymmetricencryption. In Eurocrypt ‘94, LNCS 950, pp. 92-111. Springer-Verlag, 1995.
    • (1995) Eurocrypt ‘94, LNCS 950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • Springer-Verlag
    • M. Bellare and P. Rogaway. The exact security of digital signatures - how to sign with RSA and Rabin. In Eurocrypt ‘96, LNCS 1070, pp. 399-416. Springer-Verlag, 1996.
    • (1996) Eurocrypt ‘96, LNCS 1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84867248592 scopus 로고
    • Untraceable off-line cash in wallet with observers
    • Springer-Verlag
    • S. Brands. Untraceable off-line cash in wallet with observers. In Crypto ‘93, LNCS 773, pp. 302-318. Springer-Verlag, 1993.
    • (1993) Crypto ‘93, LNCS 773 , pp. 302-318
    • Brands, S.1
  • 7
    • 84855307917 scopus 로고
    • Restrictive binding of secret-key certificates
    • Springer-Verlag
    • S. Brands. Restrictive binding of secret-key certificates. In Eurocrypt ‘95, LNCS 921, pp. 231-247. Springer-Verlag, 1995.
    • (1995) Eurocrypt ‘95, LNCS 921 , pp. 231-247
    • Brands, S.1
  • 8
    • 54349111494 scopus 로고
    • Restrictive blinding of secret-key certificates
    • S. Brands. Restrictive blinding of secret-key certificates. Tech. report, CWI, 1995.
    • (1995) Tech. Report, CWI
    • Brands, S.1
  • 10
    • 84948962858 scopus 로고
    • Blind signatures based on the discrete logarithm problem
    • Springer-Verlag
    • J. Camenisch, J.-M. Piveteau, and M. Stadler. Blind signatures based on the discrete logarithm problem. In Eurocrypt 94, LNCS 950, pp. 428-432. Springer-Verlag, 1995.
    • (1995) Eurocrypt 94, LNCS 950 , pp. 428-432
    • Camenisch, J.1    Piveteau, J.-M.2    Stadler, M.3
  • 12
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Prenum Publishing Corporation
    • D. Chaum. Blind signatures for untraceable payments. In Crypto ‘82, pp. 199-204. Prenum Publishing Corporation, 1982.
    • (1982) Crypto ‘82 , pp. 199-204
    • Chaum, D.1
  • 13
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Springer-Verlag
    • R. Cramer, I. Damgard, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Crypto ‘94, LNCS 839, pp. 174-187. Springer-Verlag, 1994.
    • (1994) Crypto ‘94, LNCS 839 , pp. 174-187
    • Cramer, R.1    Damgard, I.2    Schoenmakers, B.3
  • 14
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Springer-Verlag
    • I. Damgard. A design principle for hash functions. In Crypto ‘89, LNCS 435, pp. 416-427. Springer-Verlag, 1990.
    • (1990) Crypto ‘89, LNCS 435 , pp. 416-427
    • Damgard, I.1
  • 15
    • 0024984004 scopus 로고
    • Witness indistinguishable and witness hiding protocols
    • U. Feige and A. Shamir. Witness indistinguishable and witness hiding protocols. In 21st STOC, pp. 416-426, 1990.
    • (1990) 21St STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 16
    • 84990731886 scopus 로고
    • Practical solutions to identification and signature problems
    • Springer-Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Crypto 86, LNCS 263, pp. 186-199. Springer-Verlag, 1986.
    • (1986) Crypto 86, LNCS 263 , pp. 186-199
    • Fiat, A.1    A. Shamir, A.S.2
  • 17
    • 84858653957 scopus 로고    scopus 로고
    • A note on security proofs in the generic model
    • Springer-Verlag
    • M. Fischlin. A note on security proofs in the generic model. In Asiacrypt 2000, LNCS 1976, pp. 458-469. Springer-Verlag, 2000.
    • (2000) Asiacrypt 2000, LNCS 1976 , pp. 458-469
    • Fischlin, M.1
  • 18
    • 84955560661 scopus 로고    scopus 로고
    • Yung. “Indirect discourse proofs”: Achieving efficient fair off-line e-cash
    • Springer-Verlag
    • Y. Frankel, Y. Tsiounis, and M. Yung. “Indirect discourse proofs”: Achieving efficient fair off-line e-cash. In Asiacrypt ‘96, LNCS 1163, pp. 286-300. Springer-Verlag, 1996.
    • (1996) Asiacrypt ‘96, LNCS 1163 , pp. 286-300
    • Frankel, Y.1    Tsiounis, Y.2
  • 19
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 20
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Springer-Verlag
    • L. C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In Euro-crypt 88, LNCS 330, pp. 123-128. Springer-Verlag, 1988.
    • (1988) Euro-Crypt 88, LNCS 330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 21
    • 84955580392 scopus 로고
    • Meta-message recovery and meta-blind signature schemes based on the discrete logarithm problem and their applications
    • Springer-Verlag
    • H. Horster, M. Michels, and H. Petersen. Meta-message recovery and meta-blind signature schemes based on the discrete logarithm problem and their applications. In Asiacrypt ‘92, LNCS 917, pp. 224-237. Springer-Verlag, 1992.
    • (1992) Asiacrypt ‘92, LNCS 917 , pp. 224-237
    • Horster, H.1    Michels, M.2    Petersen, H.3
  • 22
    • 84958591696 scopus 로고    scopus 로고
    • Security of blind digital signatures
    • Springer-Verlag
    • A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures. In Crypto ‘97, LNCS 1294, pp. 150-164. Springer-Verlag, 1997.
    • (1997) Crypto ‘97, LNCS 1294 , pp. 150-164
    • Juels, A.1    Luby, M.2    Ostrovsky, R.3
  • 23
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Springer-Verlag
    • T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. In Crypto 92, LNCS 740, pp. 31-53. Springer-Verlag, 1993.
    • (1993) Crypto 92, LNCS 740 , pp. 31-53
    • Okamoto, T.1
  • 24
    • 85032864442 scopus 로고
    • Divertible zero knowledge interactive proofs and commutative random self-reducibility
    • Springer-Verlag
    • T. Okamoto and K. Ohta. Divertible zero knowledge interactive proofs and commutative random self-reducibility. In Eurocrypt ‘89, LNCS 434, pp. 134-149. Springer-Verlag, 1990.
    • (1990) Eurocrypt ‘89, LNCS 434 , pp. 134-149
    • Okamoto, T.1    Ohta, K.2
  • 25
    • 84964980361 scopus 로고
    • How to break and repair a “probably secure” untraceable payment system
    • Springer-Verlag
    • B. Pfitzmann and M. Waidner. How to break and repair a “probably secure” untraceable payment system. In Crypto ‘91, LNCS 576, pp. 338-350. Springer-Verlag, 1992.
    • (1992) Crypto ‘91, LNCS 576 , pp. 338-350
    • Pfitzmann, B.1    Waidner, M.2
  • 26
    • 84957717377 scopus 로고    scopus 로고
    • Strengthened security for blind signatures
    • Springer-Verlag
    • D. Pointcheval. Strengthened security for blind signatures. In Eurocrypt 98, LNCS, pp. 391-405. Springer-Verlag, 1998.
    • (1998) Eurocrypt 98, LNCS , pp. 391-405
    • Pointcheval, D.1
  • 27
    • 84955579666 scopus 로고    scopus 로고
    • Provably secure blind signature schemes
    • 252-265Springer-Verlag
    • D. Pointcheval and J. Stern. Provably secure blind signature schemes. In Asi-acrypt 96, LNCS 1163, pp. 252-265. Springer-Verlag, 1996.
    • (1996) Asi-Acrypt 96, LNCS 1163
    • Pointcheval, D.1    Stern, J.2
  • 28
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Springer-Verlag
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In Euro-crypt 96, LNCS 1070, pp. 387-398. Springer-Verlag, 1996.
    • (1996) Euro-Crypt 96, LNCS 1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 29
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000.
    • (2000) Journal of Cryptology
    • Pointcheval, D.1    Stern, J.2
  • 31
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239-252, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.