메뉴 건너뛰기




Volumn 1560, Issue , 1999, Pages 112-121

On quorum controlled asymmetric proxy re-encryption

Author keywords

Asymmetric proxy re encryption; El Gamal encryption; Privacy; Quorum control; Robustness; Translation certificate

Indexed keywords

CHROMIUM COMPOUNDS; DATA PRIVACY; ROBUSTNESS (CONTROL SYSTEMS);

EID: 84956869808     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-49162-7_9     Document Type: Conference Paper
Times cited : (99)

References (18)
  • 2
    • 84957718934 scopus 로고    scopus 로고
    • Divertible Protocols and Atomic Proxy Cryptography
    • M. Blaze, G. Bleumer, M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography,” Eurocrypt ’98, pp. 127-144.
    • Eurocrypt ’98 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 4
    • 85043778396 scopus 로고    scopus 로고
    • Zero-Knowledge Undeniable Signatures
    • D. Chaum, “Zero-Knowledge Undeniable Signatures,” Eurocrypt ’90, pp. 458-464.
    • Eurocrypt ’90 , pp. 458-464
    • Chaum, D.1
  • 6
    • 85032883059 scopus 로고    scopus 로고
    • A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal. “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Crypto ’84, pp. 10-18.
    • Crypto ’84 , pp. 10-18
    • Elgamal, T.1
  • 8
    • 0021409284 scopus 로고
    • Probabilistic Encryption
    • S. Goldwasser and S. Micali, “Probabilistic Encryption,” J. Comp. Sys. Sci. 28, pp 270-299, 1984.
    • (1984) J. Comp. Sys. Sci , vol.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 9
    • 84957626176 scopus 로고    scopus 로고
    • Proactive Secret Sharing, or How to Cope with Perpetual Leakage
    • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, “Proactive Secret Sharing, or How to Cope with Perpetual Leakage,” Crypto ’95, pp. 339-352.
    • Crypto ’95 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 12
    • 84982943258 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • T. P. Pedersen. “Non-interactive and information-theoretic secure verifiable secret sharing,” Crypto ’91, pp. 129-140.
    • Crypto ’91 , pp. 129-140
    • Pedersen, T.P.1
  • 13
    • 84927727752 scopus 로고    scopus 로고
    • Security Proofs for Signature Schemes
    • D. Pointcheval, J. Stern, “Security Proofs for Signature Schemes,” Eurocrypt ’96, pp. 387-398.
    • Eurocrypt ’96 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 15
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, 1979, pp. 612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 18
    • 0004196480 scopus 로고
    • Ph.D. Thesis, Carnegie Mellon University, CMU-CS-94-149
    • B. Yee, “Using Secure Coprocessors,” Ph.D. Thesis, Carnegie Mellon University, CMU-CS-94-149, 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.