메뉴 건너뛰기




Volumn 2248, Issue , 2001, Pages 552-565

How to leak a secret

Author keywords

Designated verifier signature scheme; Group signature scheme; Ring signature scheme; Signature scheme; Signer ambiguous signature scheme

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84946833891     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45682-1_32     Document Type: Conference Paper
Times cited : (1364)

References (10)
  • 1
    • 84957354154 scopus 로고
    • Efficient and generalized group signatures
    • InWalter Fumy, editor, Berlin, 1997. Springer. Lecture Notes in Computer Science
    • Jan Camenisch. Efficient and generalized group signatures. InWalter Fumy, editor, Advances in Cryptology – Eurocrypt’97, pages 465–479, Berlin, 1997. Springer. Lecture Notes in Computer Science 1233.
    • (1977) Advances in Cryptology – Eurocrypt’97 , pp. 465-479
    • Camenisch, J.1
  • 2
    • 85024290278 scopus 로고    scopus 로고
    • Group signatures
    • In D.W. Davies, editor, Berlin, 1991. Springer- Verlag. Lecture Notes in Computer Science No
    • David Chaum and Eugѐne Van Heyst. Group signatures. In D.W. Davies, editor, Advances in Cryptology — Eurocrypt’91, pages 257–265, Berlin, 1991. Springer- Verlag. Lecture Notes in Computer Science No. 547.
    • Advances in Cryptology — Eurocrypt’91 , Issue.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 3
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • In Yvo Desmedt, editor, Berlin, Springer- Verlag. Lecture Notes in Computer Science Volume
    • Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Yvo Desmedt, editor, Advances in Cryptology – CRYPTO’94, pages 174–187, Berlin, 1994. Springer- Verlag. Lecture Notes in Computer Science Volume 839.
    • (1994) Advances in Cryptology – CRYPTO’94 , vol.839 , pp. 174-187
    • Cramer, R.1    Ivan, D.2    Schoenmakers, B.3
  • 4
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644–654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 6
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • In Ueli Maurer, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Volume
    • M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Ueli Maurer, editor, Advances in Cryptology - EuroCrypt’96, pages 143–154, Berlin, 1996. Springer-Verlag. Lecture Notes in Computer Science Volume 1070.
    • (1996) Advances in Cryptology - EuroCrypt’96, Pages 143–154 , pp. 1070
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 7
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Computing, 17(2):373–386, April 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.