메뉴 건너뛰기




Volumn 1666, Issue , 1999, Pages 98-116

Adaptive security for threshold cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84957083549     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48405-1_7     Document Type: Conference Paper
Times cited : (120)

References (24)
  • 1
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds
    • ACM
    • J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds. In Proc. 8th ACM PODC, pages 201-209. ACM, 1989.
    • (1989) Proc. 8Th ACM PODC , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 2
    • 0002531104 scopus 로고
    • Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations
    • ACM
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations. In Proc. 20th STOC, pages 10. ACM, 1988.
    • (1988) Proc. 20 STOC
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • LNCS No. 658. BW. E. Berlekamp and L. Welch. Error correction of algebraic block codes. US Patent 4,633,470
    • D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In Eurocrypt '92, pages 307-323, 1992. LNCS No. 658. BW. E. Berlekamp and L. Welch. Error correction of algebraic block codes. US Patent 4,633,470.
    • (1992) Eurocrypt '92 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 5
    • 84898947315 scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • ACM
    • D. Chaum, C. Crepeau, and I. Damgard. Multiparty Unconditionally Secure Protocols. In Proc. 20th STOC, pages 11-19. ACM, 1988.
    • (1988) Proc. 20Th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 6
    • 84957680703 scopus 로고    scopus 로고
    • Zero-knowledge proof for finite fields arithmetic, or: Can zero-knowledge be for free
    • 1998, LNCS No. 1462
    • R. Cramer and I. Damgard. Zero-knowledge proof for finite fields arithmetic, or: Can zero-knowledge be for free. In Crypto '98, pages 424-441, 1998. LNCS No. 1462.
    • Crypto '98 , pp. 424-441
    • Cramer, R.1    Damgard, I.2
  • 7
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations with dishonest minority
    • LNCS No
    • R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations with dishonest minority. In Eurocrypt '99, pages 311-326, 1999. LNCS No.
    • (1999) Eurocrypt '99 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 8
  • 10
    • 0031632567 scopus 로고    scopus 로고
    • Concurrent zero-knowledge
    • ACM
    • C. Dwork, M. Naor, and A. Sahai. Concurrent zero-knowledge. In Proc. 30th STOC, pages 409-418. ACM, 1998.
    • (1998) Proc. 30Th STOC , pp. 409-418
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 12
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Full version
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Eurocrypt '96, pages 354-371, 1996. Full version: http://www.research.ibm.com/security/DSSthresh.ps.
    • (1996) Eurocrypt '96 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 13
    • 49049089688 scopus 로고    scopus 로고
    • The (In)security of distributed key generation in dlog-based cryptosystems
    • LNCS No
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. The (in)security of distributed key generation in dlog-based cryptosystems. In Eurocrypt '99, pages 295-310, 1999. LNCS No.
    • (1999) Eurocrypt '99 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 14
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM. J. Computing, 25(1), 1996.
    • (1996) SIAM. J. Computing , vol.25 , Issue.1
    • Goldreich, O.1    Krawczyk, H.2
  • 15
    • 0023985465 scopus 로고
    • Rivest. A digital signature scheme secure against adaptive chosen-message attacks
    • Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, April 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Ronald, L.3
  • 16
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali, and C. Racko_. The knowledge complexity of interactive proof-systems. SIAM. J. Computing, 18(1):186-208, February 1989.
    • (1989) SIAM. J. Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Racko_, C.3
  • 17
    • 0031628398 scopus 로고    scopus 로고
    • Simpli_ed vss and fast-track multiparty computations with applications to threshold cryptography
    • ACM
    • R. Gennaro, M. Rabin, and T Rabin. Simpli_ed vss and fast-track multiparty computations with applications to threshold cryptography. In Proc. 17th ACM PODC, pages 101-112. ACM, 1998.
    • (1998) Proc. 17Th ACM PODC , pp. 101-112
    • Gennaro, R.1    Rabin, M.2    Rabin, T.3
  • 20
    • 0032319637 scopus 로고    scopus 로고
    • Lower bounds for zero-knowledge on the internet
    • IEEE
    • J. Kilian, E. Petrank, and C. Rackoff. Lower bounds for zero-knowledge on the internet. In Proc. 39th FOCS, pages 484-492. IEEE, 1998.
    • (1998) Proc. 39Th FOCS , pp. 484-492
    • Kilian, J.1    Petrank, E.2    Rackoff, C.3
  • 21
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • LNCS No. 576
    • T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Crypto '91, pages 129-140, 1991. LNCS No. 576.
    • (1991) Crypto '91 , pp. 129-140
    • Pedersen, T.1
  • 22
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • LNCS No. 547
    • T. Pedersen. A threshold cryptosystem without a trusted party. In Eurocrypt '91, pages 522-526, 1991. LNCS No. 547.
    • (1991) Eurocrypt '91 , pp. 522-526
    • Pedersen, T.1
  • 23
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • Tal Rabin, LNCS No. 1462
    • Tal Rabin. A simplified approach to threshold and proactive RSA. In Crypto '98, pages 89-104, 1998. LNCS No. 1462.
    • (1998) Crypto '98 , pp. 89-104
  • 24
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.