메뉴 건너뛰기




Volumn 1109, Issue , 1996, Pages 74-82

Weaknesses in some threshold cryptosystems

Author keywords

Cryptanalysis; Digital signatures; Secret sharing; Threshold cryptosystems; Threshold signatures; Undeniable signatures

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY;

EID: 84955584684     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68697-5_6     Document Type: Conference Paper
Times cited : (24)

References (15)
  • 5
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, Vol. 31, 1985, pp. 521-539.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 521-539
    • ElGamal, T.1
  • 6
    • 0008095081 scopus 로고
    • Parallel reliable threshold multisignature
    • Dep. of EE & CS, Univ. of Wisconsin-Milwaukee, April
    • Y. Frankel and Y. Desmedt, "Parallel reliable threshold multisignature," Tech. Report TR-92-04-02, Dep. of EE & CS, Univ. of Wisconsin-Milwaukee, April 1992.
    • (1992) Tech. Report TR-92-04-02
    • Frankel, Y.1    Desmedt, Y.2
  • 7
    • 0028508211 scopus 로고
    • Group-oriented (í, n) threshold digital signature scheme and digital multisignature
    • September
    • L. Ham, "Group-oriented (í, n) threshold digital signature scheme and digital multisignature," IEE Proc.-Comput. Digit. Tech., Vol. 141, No. 5, September 1994, pp. 307-313.
    • (1994) IEE Proc.-Comput. Digit. Tech , vol.141 , Issue.5 , pp. 307-313
    • Ham, L.1
  • 8
    • 85088201213 scopus 로고
    • Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party
    • Springer-Verlag
    • L. Ham and S. Yang, "Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party," Advances in Cryptology - Auscrypt '92 proceedings, Springer-Verlag, 1992, pp. 133-142.
    • (1992) Advances in Cryptology - Auscrypt '92 proceedings , pp. 133-142
    • Ham, L.1    Yang, S.2
  • 10
    • 84957620003 scopus 로고
    • Threshold DSS Signatures without a Trusted Party
    • Springer-Verlag
    • S. Langford, "Threshold DSS Signatures without a Trusted Party," Advances in Cryptology - Crypto '95 proceedings, Springer-Verlag, 1995, pp. 397-409.
    • (1995) Advances in Cryptology - Crypto '95 proceedings , pp. 397-409
    • Langford, S.1
  • 11
    • 0347355738 scopus 로고
    • (t, ra)-threshold signature scheme based on discrete logarithm
    • Springer-Verlag
    • C. Li, T. Hwang, N. Lee, "(t, ra)-threshold signature scheme based on discrete logarithm," Advances in Cryptology - Eurocrypt '94 proceedings, Springer-Verlag, 1995, pp. 191-200.
    • (1995) Advances in Cryptology - Eurocrypt '94 proceedings , pp. 191-200
    • Li, C.1    Hwang, T.2    Lee, N.3
  • 13
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • April
    • R. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, Vol. 21, April 1978, pp. 294-299.
    • (1978) Communications of the ACM , vol.21 , pp. 294-299
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir, "How to share a secret," Commun. ACM, 22:612-613, November 1979.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.