메뉴 건너뛰기




Volumn 979, Issue , 1995, Pages 523-537

Efficient dynamic-resharing “verifiable secret sharing” against mobile adversary

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER VIRUSES; CRYPTOGRAPHY; VIRUSES;

EID: 84947770625     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-60313-1_168     Document Type: Conference Paper
Times cited : (18)

References (26)
  • 6
    • 84947731987 scopus 로고
    • Proc. of CM STOC
    • G. Bracha, An O(log N) Expected Round Randomized Byzantine Generals Protocol, Proc. of CM STOC 1985.
    • (1985) An
    • Bracha, G.1
  • 8
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. C. haum, C. Crépeau, and I. Damgård "Multiparty unconditionally secure protocols," ACM STOC,1988, 11-19.
    • (1988) ACM STOC , pp. 11-19
    • Haum, D.C.1    Crépeau, C.2    Damgård, I.3
  • 17
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof-Systems
    • S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, Siam J. on Computing, 18(1) (1989), pp 186-208.
    • (1989) Siam J. On Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 23
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signature and Public Key Cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. Of AC.M, 21 (1978), pp 120-126.
    • (1978) Comm. Of AC.M , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 24
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret, Commun. ACM, 22 (1979), pp 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 26
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application
    • G..I. Simmons, editor
    • G. J. Simmons. An introduction to shared secret and/or shared control schemes and their application, In G..I. Simmons, editor, Contemporary Cryptology, pp. 441-497. IEEE Press, 1992.
    • (1992) Contemporary Cryptology , pp. 441-497
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.