메뉴 건너뛰기




Volumn 1361, Issue , 1998, Pages 177-190

How to convert any digital signature scheme into a group signature scheme

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84957002815     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0028168     Document Type: Conference Paper
Times cited : (18)

References (19)
  • 1
    • 84867248592 scopus 로고
    • Untraceable Off-Line Cash in Wallets with Observers
    • Lecture Notes in Computer Science, Springer
    • S. Brands, “Untraceable Off-Line Cash in Wallets with Observers” Lecture Notes in Computer Science 773, Advances in Cryptology: Proc. Crypto ‘93, Springer, (1994), pp. 302-318.
    • (1994) Advances in Cryptology: Proc. Crypto ‘93 , vol.773 , pp. 302-318
    • Brands, S.1
  • 4
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Lecture Notes in Computer Science
    • D. Chaum, T. Pedersen, “Wallet databases with observers”, Lecture Notes in Computer Science 740, Advances in Cryptology: Proc. Crypto’92, (1993), pp. 89-105.
    • (1993) Advances in Cryptology: Proc. Crypto’92 , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 5
    • 84948980067 scopus 로고
    • New Group Signature Schemes
    • Lecture Notes in Computer Science, Springer
    • L. Chen, T. Pedersen, “New Group Signature Schemes”, Lecture Notes in Computer Science 950, Advances in Cryptology: Proc. Eurocrypt’94, Springer, (1995), pp. 163-173.
    • (1995) Advances in Cryptology: Proc. Eurocrypt’94 , vol.950 , pp. 163-173
    • Chen, L.1    Pedersen, T.2
  • 6
    • 84957673834 scopus 로고
    • On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity
    • Lecture Notes in Computer Science, Springer
    • L. Chen, T. Pedersen, “On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity”, Lecture Notes in Computer Science 921, Advances in Cryptology: Proc. Eurocrypt’95, Springer, (1995), pp. 39-49.
    • (1995) Advances in Cryptology: Proc. Eurocrypt’95 , vol.921 , pp. 39-49
    • Chen, L.1    Pedersen, T.2
  • 7
    • 85016672373 scopus 로고
    • Proofs of Partial Knowledge and Simplifies Designs of Witness Hiding Protocols
    • Lecture Notes in Computer Science, Springer
    • R. Cramer, I. Damgard, B. Schoenrnakers, “Proofs of Partial Knowledge and Simplifies Designs of Witness Hiding Protocols”, Lecture Notes in Computer Science 839, Advances in Cryptology: Proc. Crypto’94, Springer, (1994), pp. 174-187.
    • (1994) Advances in Cryptology: Proc. Crypto’94 , vol.839 , pp. 174-187
    • Cramer, R.1    Damgard, I.2    Schoenrnakers, B.3
  • 8
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, July, (1985), pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-30 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 10
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Lecture Notes in Computer Science, Springer
    • A. Fiat, A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems”, Advances in Cryptology: Proc. Crypto’86, Lecture Notes in Computer Science 263, Springer, (1987), pp. 186-194.
    • (1987) Advances in Cryptology: Proc. Crypto’86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 84955560661 scopus 로고    scopus 로고
    • Indirect Discourse Proofs: Achieving Efficient Fair Off-Line E-Cash”
    • Lecture Notes in Computer Science, Springer
    • Y. Frankel, Y. Tsiounis, M. Yung, “Indirect Discourse Proofs”: Achieving Efficient Fair Off-Line E-Cash”, Lecture Notes in Computer Science 1163, Advances in Cryptology: Proc. Asiacrypt’96, Springer, (1996), pp. 286-300.
    • (1996) Advances in Cryptology: Proc. Asiacrypt’96 , vol.1163 , pp. 286-300
    • Frankel, Y.1    Tsiounis, Y.2    Yung, M.3
  • 15
    • 35048887920 scopus 로고    scopus 로고
    • Technical Report TR-96-03, University of Technology Chemnitz-Zwickau, November
    • M. Michels, “Comments on some group signature schemes”, Technical Report TR-96-03, University of Technology Chemnitz-Zwickau, November, (1996), 4 pages, available at http://www.tu-chemnitz.de/~hpe/techrep.html.
    • (1996) Comments on some group signature schemes , pp. 4
    • Michels, M.1
  • 16
    • 84875762817 scopus 로고
    • Provable secure and practical identification schemes and corresponding signature schemes
    • Lecture Notes in Computer Science
    • T. Okamoto, “Provable secure and practical identification schemes and corresponding signature schemes”, Lecture Notes in Computer Science 740, Advances in Cryptology: Proc. Crypto ‘92, (1993), pp. 31-53.
    • (1993) Advances in Cryptology: Proc. Crypto ‘92 , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 17
    • 0029769836 scopus 로고    scopus 로고
    • New E1Gamal Type Threshold Digital Signature Scheme
    • January
    • C. Park, K. Kurosawa, “New E1Gamal Type Threshold Digital Signature Scheme”, IEICE Trans. Fundamentals. Vol. E79-A, No. 1, January, (1996), pp. 86-93.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.1 , pp. 86-93
    • Park, C.1    Kurosawa, K.2
  • 18
    • 85030460443 scopus 로고
    • A threshold Cryptosystem without a Trusted Party, Lecture Notes in Computer Science 547, Advances in Cryptology
    • Springer
    • T. Pedersen, “A threshold Cryptosystem without a Trusted Party”, Lecture Notes in Computer Science 547, Advances in Cryptology: Proc. Eurocrypt’ 91, Springer, (1992), pp. 522-526.
    • (1992) Proc. Eurocrypt’ 91 , pp. 522-526
    • Pedersen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.