메뉴 건너뛰기




Volumn 1109, Issue , 1996, Pages 157-172

Robust and efficient sharing of RSA functions

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; EFFICIENCY; NETWORK SECURITY;

EID: 84947441722     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68697-5_13     Document Type: Conference Paper
Times cited : (114)

References (25)
  • 1
    • 0000867507 scopus 로고
    • Minimum disclosure proofs of knowledge
    • [BCC88]
    • [BCC88] G. Brassard, D. Chaum, and C. Crépeau. Minimum disclosure proofs of knowledge. JCSS, 37(2): 156-189, 1988.
    • (1988) JCSS , vol.37 , Issue.2 , pp. 156-189
    • Brassard, G.1    Chaum, D.2    Crépeau, C.3
  • 2
    • 84958769452 scopus 로고
    • Convertible undeniable signatures
    • A.J. MenezesandS. A. Vanstone,editors, Springer- Verlag, Lecture Notes in Computer Science No. 537. [BCDP91]
    • [BCDP91] J. Boyar, D, Chaum, I. Damgârd, and T. Pedersen. Convertible undeniable signatures. In A.J. MenezesandS. A. Vanstone,editors, Proc. CRYPTO 90, pages 189-205. Springer- Verlag, 1991. Lecture Notes in Computer Science No. 537.
    • (1991) Proc. CRYPTO 90 , pp. 189-205
    • Boyar, J.1    Chaum, D.2    Damgârd, I.3    Pedersen, T.4
  • 4
    • 0002181960 scopus 로고
    • Digital Multisignatures
    • H. Baker and F. Piper, editors, Claredon Press, [Boy86]
    • [Boy86] C. Boyd. Digital Multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241-246. Claredon Press, 1986.
    • (1986) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 5
    • 0001868672 scopus 로고
    • Optimal asymmetric encryption
    • [BR94]
    • [BR94] M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Euwcrypt'94,1994.
    • (1994) Euwcrypt'94
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0010252194 scopus 로고
    • Undeniable signatures
    • In G. Brassard, editor, Springer-Verlag. Lecture Notes in Computer Science No, 435. [CA90]
    • [CA90] David Chaum and Hans Van Antwerpen. Undeniable signatures. In G. Brassard, editor, Proc. CRYPTO 89, pages 212-217. Springer-Verlag, 1990. Lecture Notes in Computer Science No, 435.
    • (1990) Proc. CRYPTO 89 , pp. 212-217
    • Chaum, D.1    Van Antwerpen, H.2
  • 7
    • 0003055276 scopus 로고
    • Zero-knowledge undeniable signatures
    • Springer-Verlag, Lecture Notes in Computer Science No. 473. [Cha90]
    • [Cha90] D. Chaum. Zero-knowledge undeniable signatures. In Proc. EUROCRYPT 90, pages 458-464. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 473.
    • (1990) Proc. EUROCRYPT 90 , pp. 458-464
    • Chaum, D.1
  • 10
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • In G. Brassard, editor, Springer-Verlag. Lecture Notes in Computer Science No. 435. [DF90]
    • [DF90] Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In G. Brassard, editor, Proc. CRYPTO 89, pages 307-315. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435.
    • (1990) Proc. CRYPTO 89 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 11
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science No. 576. [DF92]
    • [DF92] Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In J. Feigenbaum, editor, Proc. CRYPTO 91, pages 457-469. Springer, 1992. Lecture Notes in Computer Science No. 576.
    • (1992) Proc. CRYPTO 91 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 13
    • 0029713931 scopus 로고    scopus 로고
    • Witness-based Cryptographic Program Checking and Robust Function Sharing
    • To appear in [FGY96]
    • [FGY96] Y. Frankel, P. Gemmell, and M. Yung. Witness-based Cryptographic Program Checking and Robust Function Sharing. To appear in proceedings of STOC96,1996.
    • (1996) Proceedings of STOC96
    • Frankel, Y.1    Gemmell, P.2    Yung, M.3
  • 15
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • April [GM84]
    • [GM84] S. GoldwasserandS. Micali. Probabilistic encryption. JCSS, 28(2):270-299, April 1984.
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 16
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April [GMR88]
    • [GMR88] Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SÍAMJ. Computing, 17(2):281-308, April 1988.
    • (1988) SÍAMJ. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 17
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • February [GMR89]
    • [GMR89] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. SIAM.J. Computing, 18(l):186-208, February 1989.
    • (1989) SIAM.J. Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 20
    • 33748209465 scopus 로고
    • Foundation of Cryptography - Fragments of a Book
    • February [Gol95]
    • [Gol95] Oded Goldreich. Foundation of Cryptography - Fragments of a Book. Electronic Colloquium on Computational Complexity, February 1995. Available online from http://www.eccc.uni-trier.de/eccc/.
    • (1995) Electronic Colloquium on Computational Complexity
    • Goldreich, O.1
  • 21
    • 0010216321 scopus 로고
    • Fair public-key cryptosystems
    • In Emest F. Brickell, editor, Springer-Verlag. Lecture Notes in Computer Science No. 740. [Mic92]
    • [Mic92] Silvio Micali. Fair public-key cryptosystems. In Emest F. Brickell, editor, Proc. CRYPTO 92, pages 113-138. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740.
    • (1992) Proc. CRYPTO 92 , pp. 113-138
    • Micali, S.1
  • 22
    • 0000129601 scopus 로고
    • Distributed provers with applications to undeniable signatures
    • [Ped91]
    • [Ped91] T. Pedersen, Distributed provers with applications to undeniable signatures. In Euro- crypt'9l, 1991.
    • (1991) Euro- crypt'9l
    • Pedersen, T.1
  • 23
    • 0028542745 scopus 로고
    • Robust Sharing of Secrets When the Dealer is Honest or Faulty
    • [Rab94]
    • [Rab94] T. Rabin. Robust Sharing of Secrets When the Dealer is Honest or Faulty. Journal of the ACM, 41(6): 1089-1109,1994.
    • (1994) Journal of the ACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 25
    • 0018545449 scopus 로고
    • How to Share a Secret
    • [Sha79]
    • [Sha79] A. Shamir. How to Share a Secret. Communications of the ACM, 22:612-613,1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.