메뉴 건너뛰기




Volumn 1514, Issue , 1998, Pages 11-24

Generation of shared RSA keys by two parties

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84947809931     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-49649-1_2     Document Type: Conference Paper
Times cited : (29)

References (26)
  • 1
    • 85032877753 scopus 로고
    • Non-Interactive Oblivious Transfer and Application
    • Springer-Verlag
    • M. Bellare and S. Micali. Non-Interactive Oblivious Transfer and Application. In Crypto '89, LNCS 435, pages 547-557. Springer-Verlag, 1990.
    • (1990) Crypto '89, LNCS 435 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 2
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • ACM Press
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Proc. of the 20th STOC, pages 1-10. ACM Press, 1988.
    • (1988) Proc. Of the 20Th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 84958639277 scopus 로고    scopus 로고
    • Efficient Generation of Shared RSA Keys
    • Springer-Verlag
    • D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys. In Crypto '97, LNCS 1294, pages 425-439. Springer-Verlag, 1997.
    • (1997) Crypto '97, LNCS 1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 6
    • 0022864717 scopus 로고
    • Information Theoretic Reductions among Disclosure Problems
    • IEEE
    • G. Brassard, C. Crépeau, and J-M. Robert. Information Theoretic Reductions among Disclosure Problems. In Proc. of the 27th FOCS, pages 168-173. IEEE, 1986.
    • (1986) Proc. Of the 27Th FOCS , pp. 168-173
    • Brassard, G.1    Crépeau, C.2    Robert, J.-M.3
  • 7
    • 84888252697 scopus 로고
    • All-or Nothing Disclosure of Secrets
    • Springer-Verlag
    • G. Brassard, C. Crépeau, and J-M. Robert. All-or Nothing Disclosure of Secrets. In Crypto '86, LNCS 263, pages 234-238. Springer-Verlag, 1987.
    • (1987) Crypto '86, LNCS 263 , pp. 234-238
    • Brassard, G.1    Crépeau, C.2    Robert, J.-M.3
  • 8
    • 84898947315 scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • ACM Press
    • D. Chaum, C. Crépeau, and I. Damgard. Multiparty Unconditionally Secure Protocols. In Proc. of the 20th STOC, pages 11-19. ACM Press, 1988.
    • (1988) Proc. Of the 20Th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgard, I.3
  • 9
    • 0024860209 scopus 로고
    • A Zero-One Law for Boolean Privacy
    • ACM Press
    • B. Chor and E. Kushilevitz. A Zero-One Law for Boolean Privacy. In Proc. of the 21st STOC, pages 62-72. ACM Press, 1989.
    • (1989) Proc. Of the 21St STOC , pp. 62-72
    • Chor, B.1    Kushilevitz, E.2
  • 12
    • 0024132071 scopus 로고
    • Achieving Oblivious Transfer Using Weakened Security Assumptions
    • IEEE
    • C. Crépeau and J. Kilian. Achieving Oblivious Transfer Using Weakened Security Assumptions. In Proc. of the 29th FOCS, pages 42-52. IEEE, 1988.
    • (1988) Proc. Of the 29Th FOCS , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 13
    • 84957649042 scopus 로고
    • Commited Oblivious Transfer and Private Multy-Party Computation
    • Springer-Verlag
    • C. Crépeau, J. van de Graaf, and A. Tapp. Commited Oblivious Transfer and Private Multy-Party Computation. In Crypto '95, LNCS 963, pages 110-123. Springer-Verlag, 1995.
    • (1995) Crypto '95, LNCS 963 , pp. 110-123
    • Crépeau, C.1    Van De Graaf, J.2    Tapp, A.3
  • 17
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • february
    • S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM journal of computing, 18(1):186-208, february 1989.
    • (1989) SIAM Journal of Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 18
    • 84898989941 scopus 로고
    • Founding Cryptography on Oblivious Transfer
    • ACM Press
    • J. Kilian. Founding Cryptography on Oblivious Transfer. In Proc. of the 20thSTOC, pages 20-31. ACM Press, 1988.
    • (1988) Proc. Of the 20Th STOC , pp. 20-31
    • Kilian, J.1
  • 19
    • 0032218237 scopus 로고    scopus 로고
    • A New Public Key Cryptosystem Based on Higher Residues
    • ACM press
    • D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. In Proc. of the 5th CCCS. ACM press, 1998.
    • (1998) Proc. Of the 5Th CCCS
    • Naccache, D.1    Stern, J.2
  • 20
    • 84927727752 scopus 로고    scopus 로고
    • Security Proofs for Signature Schemes
    • Springer-Verlag
    • D Pointcheval, and J Stern. Security Proofs for Signature Schemes. In Eurocrypt 96, LNCS 1070, pages 387-398. Springer-Verlag, 1996.
    • (1996) Eurocrypt 96, LNCS 1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 22
    • 84972540003 scopus 로고
    • Approximate Formulas for some Functions of Prime Numbers
    • march
    • J.N. Rosser and L. Schoenfeld. Approximate Formulas for some Functions of Prime Numbers. Illinois Journal of Mathematics, 6(1):64-94, march 1962.
    • (1962) Illinois Journal of Mathematics , vol.6 , Issue.1 , pp. 64-94
    • Rosser, J.N.1    Schoenfeld, L.2
  • 23
    • 0003610767 scopus 로고    scopus 로고
    • A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems
    • K. Sakurai and H. Shizuya. A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. Journal of Cryptology, 11(1):29-43, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.1 , pp. 29-43
    • Sakurai, K.1    Shizuya, H.2
  • 25
    • 84947772655 scopus 로고    scopus 로고
    • A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol
    • Springer-Verlag
    • J.P. Stern. A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol. In Asiacrypt 98, LNCS. Springer-Verlag, 1998.
    • (1998) Asiacrypt 98, LNCS
    • Stern, J.P.1
  • 26
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • IEEE
    • A. C. Yao. How to Generate and Exchange Secrets. In Proc. of the 27th FOCS, pages 162-167. IEEE, 1986.
    • (1986) Proc. Of the 27Th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.