메뉴 건너뛰기




Volumn 1716, Issue , 1999, Pages 196-207

Adaptively-secure optimal-resilience proactive rsa

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84956868458     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (34)
  • 1
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • Lecture Notes in Computer Science
    • D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In Advances in Cryptology—EUROCRYPT 92, volume 658 of Lecture Notes in Computer Science, pages 307–323. Springer-Verlag, 24–28 May 1992.
    • (1992) Advances in Cryptology—EUROCRYPT 92 , vol.658 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 6
    • 38149065479 scopus 로고
    • Advances in Cryptology—CRYPTO’89
    • Advances in Cryptology—CRYPTO’89, volume 435 of Lecture Notes in Computer Science. Springer-Verlag, 1990, 20–24 Aug. 1989.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 20-24
  • 7
    • 84956862838 scopus 로고
    • Advances in Cryptology—CRYPTO’91
    • Advances in Cryptology—CRYPTO’91, volume 576 of Lecture Notes in Computer Science. Springer-Verlag, 1992, 11–15 Aug. 1991.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 11-15
  • 9
    • 84985822377 scopus 로고
    • Threshold cryptosystems. In J. Seberry and Y. Zheng, editors, Springer-Verlag
    • Y. Desmedt. Threshold cryptosystems. In J. Seberry and Y. Zheng, editors, Advances in Cryptology—AUSCRYPT’92, volume 718 of Lecture Notes in Computer Science, pages 3–14, Gold Coast, Queensland, Australia, 13–16 Dec. 1992. Springer-Verlag.
    • (1992) Advances in Cryptology—AUSCRYPT’92 , vol.718 , pp. 3-14
    • Desmedt, Y.1
  • 14
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In 28th Annual Symposium on Foundations of Computer Science, pages 427–437, Los Angeles, California, 12–14 Oct. 1987. IEEE. 182
    • (1987) In 28Th Annual Symposium on Foundations , pp. 427-437
    • Feldman, P.1
  • 19
    • 84958045007 scopus 로고    scopus 로고
    • Adaptively-secure distributed public-key systems
    • Y. Frankel, P. D. MacKenzie, and M. Yung. Adaptively-secure distributed public-key systems. In European Symposium on Algorithms—ESA’99, volume 1643 of Lecture Notes in Computer Science, pages 4–27. Springer-Verlag, 16–18 July 1998.
    • (1998) In European Symposium on Algorithms—ESA’99 , vol.1643 , pp. 4-27
    • Frankel, Y.1    Mackenzie, P.D.2    Yung, M.3
  • 21
    • 22044454382 scopus 로고    scopus 로고
    • Distributed public-key cryptosystems Advances in Public Key Cryptography—PKC’98
    • Y. Frankel and M. Yung. Distributed public-key cryptosystems. In H. Imai and Y. Zheng, editors, Advances in Public Key Cryptography—PKC’98, volume 1431 of Lecture Notes in Computer Science, pages 1–13. Springer-Verlag, Feb. 1998. invited talk.
    • (1998) Lecture Notes in Computer Science , vol.1431 , pp. 1-13
    • Frankel, Y.1    Yung, M.2    Imai, H.3    Zheng, Y.4
  • 22
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Advances in Cryptology—CRYPTO’96, volume 1109 of Lecture Notes in Computer Science, pages 157–172. Springer-Verlag, 18–22 Aug. 1996.
    • (1996) In Advances in Cryptology—CRYPTO’96 , vol.1109 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 25
    • 84957626176 scopus 로고
    • Proactive secret sharing, or: How to cope with perpetual leakage, Springer-Verlag
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In Advances in Cryptology—CRYPTO’95, volume 963 of Lecture Notes in Computer Science, pages 339–352. Springer-Verlag, 27–31 Aug. 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 27
    • 84871584138 scopus 로고    scopus 로고
    • Advances in Cryptology—CRYPTO’98
    • Springer-Verlag
    • H. Krawczyk, editor. Advances in Cryptology—CRYPTO’98, volume 1462 of Lecture Notes in Computer Science. Springer-Verlag, 17–21 Aug. 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 17-21
    • Krawczyk, H.1
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22:612–613, 1979.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.