메뉴 건너뛰기




Volumn 2248, Issue , 2001, Pages 583-601

Provably secure fair blind signatures with tight revocation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84946829122     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45682-1_34     Document Type: Conference Paper
Times cited : (20)

References (26)
  • 3
    • 0033281266 scopus 로고    scopus 로고
    • Efficient verifiable encryption (And fair exchange) of digital signatures
    • Association for Computing Machinery
    • G. Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. In ACM CCS’99, pages 138–146. Association for Computing Machinery, 1999.
    • (1999) ACM CCS’99 , pp. 138-146
    • Ateniese, G.1
  • 4
    • 35248823311 scopus 로고    scopus 로고
    • An efficient verifiable encryption scheme for encryption of discrete logarithms
    • F. Bao. An efficient verifiable encryption scheme for encryption of discrete logarithms. In CARDIS’98, 1998.
    • (1998) CARDIS’98
    • Bao, F.1
  • 5
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Association for Computing Machinery
    • M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In First ACM Conference on Computer and Communication Security, pages 62–73. Association for Computing Machinery, 1993.
    • (1993) First ACM Conference on Computer and Communication Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 22
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000.
    • (2000) Journal of Cryptology
    • Pointcheval, D.1    Stern, J.2
  • 25
    • 50749133265 scopus 로고
    • On blind signatures and perfect crime
    • S. von Solms and D. Naccache. On blind signatures and perfect crime. Computer & Security, 11:581–583, 1992.
    • (1992) Computer & Security , vol.11 , pp. 581-583
    • Von Solms, S.1    Naccache, D.2
  • 26
    • 84947773427 scopus 로고    scopus 로고
    • Finding length-3 positive cunningham chains and their cryptographic significance
    • Springer-Verlag
    • A. Young and M. Yung. Finding length-3 positive cunningham chains and their cryptographic significance. In ANTS ’98, Lecture Notes in Computer Science. Springer-Verlag, 1998.
    • (1998) ANTS ’98, Lecture Notes in Computer Science
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.