메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 207-220

Practical threshold signatures

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84948954277     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_15     Document Type: Conference Paper
Times cited : (600)

References (25)
  • 1
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • BBM00. M. Bellare, A. Boldyreva, and S. Micali. Public-key encryption in a multi-user setting: security proofs and improvements. In Advances in Cryptology-Eurocrypt 2000, pages 259-274, 2000.
    • (2000) Advances in Cryptology-Eurocrypt , vol.2000 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 6
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Des87. Y. Desmedt. Society and group oriented cryptography: a new concept. In Advances in Cryptology-Crypto ’87, pages 120-127, 1987.
    • (1987) Advances in Cryptology-Crypto ’87 , pp. 120-127
    • Desmedt, Y.1
  • 8
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • ElG85. T. ElGamal. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31:469-472, 1985.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 14
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • FS87. A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology-Crypto ’86, Springer LNCS 263, pages 186-194, 1987.
    • (1987) Advances in Cryptology-Crypto ’86, Springer LNCS , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 17
    • 0028508211 scopus 로고
    • Group-oriented (T;n) threshold digitial signature scheme and digital multisignature
    • Har94. L. Harn. Group-oriented (t;n) threshold digitial signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech., 141(5):307-313, 1994.
    • (1994) IEE Proc.-Comput. Digit. Tech. , vol.141 , Issue.5 , pp. 307-313
    • Harn, L.1
  • 18
    • 84957658795 scopus 로고
    • A simple method for generating and sharing pseudo-random functions, with applications to Clipper-like key escrow systems
    • MS95. S. Micali and R. Sidney. A simple method for generating and sharing pseudo-random functions, with applications to Clipper-like key escrow systems. In Advances in Cryptology-Crypto ’95, pages 185-196, 1995.
    • (1995) Advances in Cryptology-Crypto ’95 , pp. 185-196
    • Micali, S.1    Sidney, R.2
  • 20
    • 0342779118 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • Rab98. T. Rabin. A simplified approach to threshold and proactive RSA. In Advances in Cryptology-Crypto ’98, 1998.
    • (1998) Advances in Cryptology-Crypto ’98
    • Rabin, T.1
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RSA78. R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, pages 120-126, 1978.
    • (1978) Communications of the ACM , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • Sha79. A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 23
    • 0000164225 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Sho97. V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology-Eurocrypt ’97, 1997.
    • (1997) Advances in Cryptology-Eurocrypt ’97
    • Shoup, V.1
  • 24
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • April
    • Sho99. V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120, April 1999.
    • (1999) IBM Research Report RZ , vol.3120
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.