메뉴 건너뛰기




Volumn 9331, Issue , 2015, Pages 155-171

Two-factor authentication for the bitcoin protocol

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; SMARTPHONES; USER INTERFACES;

EID: 84951869859     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-24858-5_10     Document Type: Conference Paper
Times cited : (7)

References (37)
  • 4
    • 84951871753 scopus 로고    scopus 로고
    • NIST Special Publication 800-57 - Recommendation for Key Management - Part 1: General (Revision 3)
    • Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: NIST Special Publication 800-57 - Recommendation for Key Management - Part 1: General (Revision 3). National Institute of Standards and Technology (2012). http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf
    • (2012) National Institute of Standards and Technology
    • Barker, E.1    Barker, W.2    Burr, W.3    Polk, W.4    Smid, M.5
  • 10
    • 84958774556 scopus 로고    scopus 로고
    • A statistically-hiding integer commitment scheme based on groups with hidden order
    • In: Zheng, Y. (ed.), Springer, Heidelberg
    • Damgard, I.B., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASI- ACRYPT 2002. LNCS, vol. 2501, pp. 125-142. Springer, Heidelberg (2002). http://dx.doi.org/10.1007/3-540-36178-2_8
    • (2002) ASI- ACRYPT 2002. LNCS , vol.2501 , pp. 125-142
    • Damgard, I.B.1    Fujisaki, E.2
  • 11
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • In: Kaliski Jr, B.S. (ed.), Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997). http://dx.doi.org/10.1007/BFb0052225
    • (1997) CRYPTO 1997 , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 12
    • 84890514001 scopus 로고    scopus 로고
    • Generating safe primes
    • 1862-2984 (Online) 1862-2976 Print
    • von zur Gathen, J., Shparlinski, I.: Generating safe primes. J. Math. Cryptol. 7(4), 333-365 (2013). ISSN 1862-2984 (Online) 1862-2976 (Print), http://dx.doi.org/10.1515/jmc-2013-5011
    • (2013) J. Math. Cryptol , vol.7 , Issue.4 , pp. 333-365
    • Von Zur Gathen, J.1    Shparlinski, I.2
  • 17
    • 84951875405 scopus 로고    scopus 로고
    • Bitcoin Mailing list
    • Hearn, M.: Update on mobile 2-factor wallets (2014). Bitcoin Mailing list at http://sourceforge.net, http://sourceforge.net/p/bitcoin/mailman/message/33017648/
    • (2014) Update on Mobile 2-Factor Wallets
    • Hearn, M.1
  • 18
    • 85150432710 scopus 로고    scopus 로고
    • A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
    • Ibrahim, M.H., Ali, I.A., Ibrahim, I.I., El-sawi, A.H.: A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme. In: MWCAS03, vol. 1, pp. 276-280.
    • MWCAS03 , vol.1 , pp. 276-280
    • Ibrahim, M.H.1    Ali, I.A.2    Ibrahim, I.I.3    El-Sawi, A.H.4
  • 19
    • 84951875406 scopus 로고    scopus 로고
    • 0-7803-8294-3, 1548-3746
    • IEEE Computer Society, Cairo (2003). ISBN 0-7803-8294-3, ISSN 1548-3746, http://dx.doi.org/10.1109/MWSCAS.2003.1562272
    • (2003)
  • 20
    • 0001464763 scopus 로고
    • Multiplication of multidigit numbers on automata
    • Translated from Doklady Akademii Nauk SSSR145, No. 2293-294, July 1962
    • Karatsuba, A., Ofman, Y.: Multiplication of multidigit numbers on automata. Sov. Phys. Doklady 7(7), 595-596 (1963). Translated from Doklady Akademii Nauk SSSR, vol. 145, No. 2, pp. 293-294, July 1962
    • (1963) Sov. Phys. Doklady , vol.7 , Issue.7 , pp. 595-596
    • Karatsuba, A.1    Ofman, Y.2
  • 23
    • 84957620003 scopus 로고
    • Coppersmith, (ed.), Springer, Heidelberg
    • Langford, S.K.: Threshold DSS signatures without a trusted party. In: Coppersmith, (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 397-409. Springer, Heidelberg (1995). http://dx.doi.org/10.1007/3-540-44750-4_32
    • (1995) Threshold DSS signatures without a trusted party , vol.963 , pp. 397-409
    • Langford, S.K.1
  • 25
    • 33645398871 scopus 로고    scopus 로고
    • Two-party generation of DSA signatures
    • MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. Int. J. Inf. Secur. 2(3-4), 218-239 (2004). http://dx.doi.org/10.1007/s10207-004-0041-0
    • (2004) Int. J. Inf. Secur , vol.2 , Issue.3-4 , pp. 218-239
    • Mackenzie, P.1    Reiter, M.K.2
  • 26
    • 84951875408 scopus 로고    scopus 로고
    • A prototypic implementation of a two-factor Bitcoin wallet: Source code
    • Christopher Mann (2014). A prototypic implementation of a two-factor Bitcoin wallet: Source code. GitHub. https://github.com/ChristopherMann/2FactorWallet
    • (2014) Github
    • Mann, C.1
  • 27
    • 84951875409 scopus 로고    scopus 로고
    • Master thesis, Mathematisch-Naturwissenschaftliche Fakultat der Rheinischen Friedrich-Wilhelms- Universitat Bonn
    • Mann, C.: Two-factor authentication for the Bitcoin protocol. Master thesis, Mathematisch-Naturwissenschaftliche Fakultat der Rheinischen Friedrich-Wilhelms- Universitat Bonn (2015). https://github.com/ChristopherMann/2FactorWallet/raw/master/BitcoinTwoFactorAuth.pdf
    • (2015) Two-Factor Authentication for the Bitcoin Protocol
    • Mann, C.1
  • 28
    • 79251545889 scopus 로고    scopus 로고
    • Cryptography Mailing list, NIST: Federal Information Processing Standards Publication 180-4 - Secure Hash Standard
    • Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at metzdowd.com, 9 pages (2008). https://bitcoin.org/bitcoin.pdf NIST: Federal Information Processing Standards Publication 180-4 - Secure Hash Standard.
    • (2008) Bitcoin: A Peer-To-Peer Electronic Cash System , pp. 9
    • Nakamoto, S.1
  • 29
    • 84951875410 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (2012). http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf
    • (2012)
  • 31
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • In: Stern, J. (ed.), Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999). http://dx.doi.org/10.1007/3-540-48910-X16
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 32
    • 84951875411 scopus 로고    scopus 로고
    • Finding holes operation emmental
    • Sancho, D., Hacquebord, F., Link, R.: Finding holes operation emmental. Technical report, Trend Micro Incorporated (2014). http://housecall. trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-finding-holes-operation-emmental.pdf
    • (2014) Technical Report, Trend Micro Incorporated
    • Sancho, D.1    Hacquebord, F.2    Link, R.3
  • 33
    • 34250459760 scopus 로고
    • Schnelle Multiplikation grofier Zahlen
    • Schonhage, A., Strassen, V.: Schnelle Multiplikation grofier Zahlen. Computing 7, 281-292 (1971)
    • (1971) Computing , vol.7 , pp. 281-292
    • Schonhage, A.1    Strassen, V.2
  • 35
    • 0031362009 scopus 로고    scopus 로고
    • (t+1, n) threshold and generalized DSS signatures without a trusted party
    • 0-8-86-8274-4
    • Wang, C.-H., Hwang, T.: (t+1, n) threshold and generalized DSS signatures without a trusted party. In: Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), pp. 221-226. IEEE (1997). ISBN: 0-8186-8274-4, http://dx.doi.org/10.1109/CSAC.1997.646193
    • (1997) In: Proceedings of the 13th Annual Computer Security Applications Conference , pp. 221-226
    • Wang, C.-H.1    Hwang, T.2
  • 36
    • 54049105893 scopus 로고    scopus 로고
    • Safe prime generation with a combined sieve
    • Wiener, M.J.: Safe prime generation with a combined sieve. Cryptology ePrint Archive 2003/186 (2003). http://eprint.iacr.org/2003/186
    • (2003) Cryptology Eprint Archive 2003/186
    • Wiener, M.J.1
  • 37
    • 84951872398 scopus 로고    scopus 로고
    • Dealing with malleability
    • Wuille, P.: Dealing with malleability. Technical report, Bitcoin Project (2014). https://github.com/bitcoin/bips/blob/master/bip-0062.mediawiki
    • (2014) Technical Report, Bitcoin Project
    • Wuille, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.