메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 557-572

How to break a practical MIX and design a new one

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY;

EID: 84948958135     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_39     Document Type: Conference Paper
Times cited : (90)

References (29)
  • 1
    • 84957715741 scopus 로고    scopus 로고
    • Universally verifiable mix-net with verification work independent of the number of mix-centers
    • M. Abe, “Universally verifiable mix-net with verification work independent of the number of mix-centers,” Eurocrypt’98, pp. 437-447.
    • Eurocrypt’98 , pp. 437-447
    • Abe, M.1
  • 2
    • 84937500008 scopus 로고    scopus 로고
    • A mix-network on permutation networks
    • (in Japanese) (May
    • M. Abe, “A mix-network on permutation networks,” ISEC Technical report 99-10 (in Japanese) (May, 1999)
    • (1999) ISEC Technical Report 99-10
    • Abe, M.1
  • 3
    • 84956854310 scopus 로고    scopus 로고
    • Mix-networks on permutation networks
    • M. Abe, “Mix-networks on permutation networks,” Asiacrypt’99, pp. 258-273.
    • Asiacrypt’99 , pp. 258-273
    • Abe, M.1
  • 4
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public key encryption schemes
    • M. Bellare, A. Desai, D. Poincheval, P. Rogaway, “Relations among notions of security for public key encryption schemes,” Crypto’98, pp. 26-45.
    • Crypto’98 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Poincheval, D.3    Rogaway, P.4
  • 5
    • 84948986458 scopus 로고    scopus 로고
    • Optimal asymmetric encryption - How to encrypt with RSA
    • M. Bellare, P. Rogaway, “Optimal asymmetric encryption - How to encrypt with RSA,” Eurocrypt’94, pp. 92-111.
    • Eurocrypt’94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, Vol. 24, 1981, pp. 84-88.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 9
  • 10
    • 85032883059 scopus 로고    scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” Crypto’84, pp. 10-18.
    • Crypto’84 , pp. 10-18
    • Elgamal, T.1
  • 11
    • 0001292443 scopus 로고    scopus 로고
    • A practical secret voting scheme for large scale elections
    • A. Fujioka, T. Okamoto, K. Ohta, “A practical secret voting scheme for large scale elections,” Auscrypt’92, pp. 244-251.
    • Auscrypt’92 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 14
    • 0002986499 scopus 로고    scopus 로고
    • Mix-based electronic payments
    • M. Jakobsson, D. M’Raihi, “Mix-based electronic payments,” SAC’98, pp. 157-173.
    • SAC’98 , pp. 157-173
    • Jakobsson, M.1    M’Raihi, D.2
  • 15
    • 33646777352 scopus 로고    scopus 로고
    • Flash mixing
    • M. Jakobsson, “Flash mixing,” PODC’99, pp. 83-89.
    • PODC’99 , pp. 83-89
    • Jakobsson, M.1
  • 17
    • 0038933986 scopus 로고
    • Covering design I: Coverings by a small number of subsets
    • W. H. Mills, “Covering design I: coverings by a small number of subsets,” Ars Combin. 8, (1979), pp. 199-315.
    • (1979) Ars Combin , vol.8 , pp. 199-315
    • Mills, W.H.1
  • 19
    • 0000900573 scopus 로고    scopus 로고
    • All/nothing election scheme and anonymous channel
    • C. Park, K. Itoh, K. Kurosawa, “All/nothing election scheme and anonymous channel,” Eurocrypt’93, pp. 248-259.
    • Eurocrypt’93 , pp. 248-259
    • Park, C.1    Itoh, K.2    Kurosawa, K.3
  • 20
    • 85030460443 scopus 로고    scopus 로고
    • A threshold cryptosystem without a trusted party
    • T. P. Pedersen, “A threshold cryptosystem without a trusted party,” Eurocrypt’91, pp. 522-526.
    • Eurocrypt’91 , pp. 522-526
    • Pedersen, T.P.1
  • 21
    • 85032859691 scopus 로고    scopus 로고
    • How to break the direct RSA-implementation of MIXes
    • B. Pfitzmann, A. Pfitzmann. “How to break the direct RSA-implementation of MIXes,” Eurocrypt’89, pp. 373-381.
    • Eurocrypt’89 , pp. 373-381
    • Pfitzmann, B.1    Pfitzmann, A.2
  • 22
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • D. Pointcheval, J. Stern, “Security proofs for signature schemes,” Eurocrypt’96, pp. 387-398.
    • Eurocrypt’96 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 23
    • 0039527186 scopus 로고    scopus 로고
    • An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme
    • R. Rees, D. R. Stinson, R. Wei, G. H. J. van Rees, “An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme,” Ars Combin. 531 (1999), pp. 225-237.
    • (1999) Ars Combin , vol.531 , pp. 225-237
    • Rees, R.1    Stinson, D.R.2    Wei, R.3    Van Rees, G.H.4
  • 24
    • 84957356080 scopus 로고    scopus 로고
    • Receipt-free mix-type voting scheme
    • K. Sako, J. Kilian, “Receipt-free mix-type voting scheme,” Eurocrypt’95, pp. 393-403.
    • Eurocrypt’95 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 25
    • 0000537828 scopus 로고    scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr, “Efficient signature generation for smart cards,” Crypto’89, pp. 239-252.
    • Crypto’89 , pp. 239-252
    • Schnorr, C.P.1
  • 27
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, 1979, pp. 612-613
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 28
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal based encryption
    • Y. Tsiounis, M. Yung, “On the security of ElGamal based encryption,” PKC’98, pp. 117-134.
    • PKC’98 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.