메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 190-199

Publicly verifiable secret sharing

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84947917119     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_17     Document Type: Conference Paper
Times cited : (426)

References (21)
  • 2
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • volume 48 ofAmerican Federation of Information Processing Societies Proceedings
    • B. Blakley. Safeguarding cryptographic keys. InProceedings of the National Computer Conference 1979, volume 48 ofAmerican Federation of Information Processing Societies Proceedings, pages 313-317, 1979.
    • (1979) Proceedings of the National Computer Conference 1979 , pp. 313-317
    • Blakley, B.1
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Transactions on Information Theory, IT-31(4):469 472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 12
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solution to identification and signature problems
    • volume 263 ofLecture Notes in Computer Science. Springer-Verlag,
    • A. Fiat and A. Shamir. How to prove yourself: Practical solution to identification and signature problems. InAdvances in Cryptology-CRYPTO'86, volume 263 ofLecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology-CRYPTO'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 14
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • volume 330 ofLecture Notes in Computer Science. Springer-Verlag,
    • L. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. InAdvances in Cryptology - EUROCRYPT'88, volume 330 ofLecture Notes in Computer Science, pages 123-128. Springer-Verlag, 1988.
    • (1988) Advances in Cryptology - EUROCRYPT'88 , pp. 123-128
    • Guillou, L.1    Quisquater, J.-J.2
  • 16
    • 0041591168 scopus 로고
    • Technical Report TR-579.b, MIT, November
    • S. Micali. Fair cryptosystems. Technical Report TR-579.b, MIT, November 1993.
    • (1993) Fair cryptosystems
    • Micali, S.1
  • 18
    • 84876222959 scopus 로고
    • Distributed provers with applications to undeniable signatures
    • volume 547 ofLecture Notes in Computer Science. Springer-Verlag,
    • T. Pedersen. Distributed provers with applications to undeniable signatures. InAdvances in Cryptology - EUROCRYPT'91, volume 547 ofLecture Notes in Computer Science, pages 221-242. Springer-Verlag, 1992.
    • (1992) Advances in Cryptology - EUROCRYPT'91 , pp. 221-242
    • Pedersen, T.1
  • 19
    • 0000537828 scopus 로고
    • Efficient identification and signature for smart cards
    • volume 435 ofLecture Notes in Computer Science. Springer-Verlag,
    • C. Schnorr. Efficient identification and signature for smart cards. InAdvances in Cryptology-CRYPTO'89, volume 435 ofLecture Notes in Computer Science, pages 239-252. Springer-Verlag, 1990.
    • (1990) Advances in Cryptology-CRYPTO'89 , pp. 239-252
    • Schnorr, C.1
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret.Communications of the ACM, 22(11):612 613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 21
    • 84957629646 scopus 로고
    • Fair blind signatures
    • volume 921 ofLecture Notes in Computer Science. Springer-Verlag,
    • M. Stadler, J.-M. Piveteau, and J. Camenisch. Fair blind signatures. InAdvances in Cryptology-EUROCRYPT'95, volume 921 ofLecture Notes in Computer Science, pages 209-219. Springer-Verlag, 1995.
    • (1995) Advances in Cryptology-EUROCRYPT'95 , pp. 209-219
    • Stadler, M.1    Piveteau, J.-M.2    Camenisch, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.