메뉴 건너뛰기




Volumn 963, Issue , 1995, Pages 339-352

Proactive secret sharing or: How to cope with perpetual leakage

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INFORMATION THEORY;

EID: 84957626176     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44750-4_27     Document Type: Conference Paper
Times cited : (486)

References (19)
  • 2
    • 85062838317 scopus 로고
    • Safeguarding Cryptographic Keys
    • G.R. Blkley, Safeguarding Cryptographic Keys, AFIPS Con. Proc (v. 48), 1979, pp 313-317.
    • (1979) AFIPS Con. Proc , vol.48 , pp. 313-317
    • Blkley, G.R.1
  • 3
    • 84984842401 scopus 로고    scopus 로고
    • Maintaining Security in the Presence of Transient Faults
    • (LNCS 839)
    • R. Canetti and A. Herzberg, Maintaining Security in the Presence of Transient Faults, Proc. Crypto'94 (LNCS 839), pp. 425-438.
    • Proc. Crypto'94 , pp. 425-438
    • Canetti, R.1    Herzberg, A.2
  • 5
    • 0003027707 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneoxis Broadcast
    • B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable Secret Sharing and Achieving Simultaneoxis Broadcast, Proc. of IEEE Foes 1985, pp. 335-344.
    • (1985) Proc. of IEEE Foes , pp. 335-344
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 6
    • 0021522644 scopus 로고
    • How to Construct Cryptographically Strong Sequences of Pseudorandom Bits
    • M. Blum and S. Micali, How to Construct Cryptographically Strong Sequences of Pseudorandom Bits. SIAM J. Comp. 13, 1984.
    • (1984) SIAM J. Comp , pp. 13
    • Blum, M.1    Micali, S.2
  • 8
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • In G. Brassard, editor, (Lecture Notes in Computer Science 435), Springer-Verlag
    • Y. Desmedt and Y. Frankel, Threshold cryptosystems, In G. Brassard, editor, Advances in Cryptology, Proc. of Crypto '89 (Lecture Notes in Computer Science 435), pages 307-315. Springer-Verlag, 1990.
    • (1990) Advances in Cryptology, Proc. of Crypto '89 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 10
    • 84874800178 scopus 로고
    • A Public key cryptosystem and a signature scheme based on discrete logarithm
    • T. El Gamal, A Public key cryptosystem and a signature scheme based on discrete logarithm, IEEE TVans. on Information Theory 31, 465-472, 1985.
    • (1985) IEEE TVans. on Information Theory , vol.31 , pp. 465-472
    • El Gamal, T.1
  • 12
    • 0021409284 scopus 로고
    • Probabilistic Encryption, 3
    • S. Goldwasser and S. Micali, Probabilistic Encryption, 3. Com. Sys. Sci. 28 (1984), pp 270-299.
    • (1984) Com. Sys. Sci , vol.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 15
    • 0023985034 scopus 로고
    • The Discrete Log. Problem Hides 0(Log N) Bits
    • D.L. Long and A. Wigderson, The Discrete Log. Problem Hides 0(Log N) Bits. SIAM J. Comp. 17, 1988, pp. 363-372.
    • (1988) SIAM J. Comp , vol.17 , pp. 363-372
    • Long, D.L.1    Wigderson, A.2
  • 16
    • 84876222959 scopus 로고    scopus 로고
    • Distributed Provers with Applications to Undeniable Signature
    • (LNCS 547)
    • T. P. Pedersen, Distributed Provers with Applications to Undeniable Signature, Proc. Eurocrypt '91 (LNCS 547), pp. 221-242.
    • Proc. Eurocrypt '91 , pp. 221-242
    • Pedersen, T.P.1
  • 17
    • 84982943258 scopus 로고    scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • (LNCS 576)
    • T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. Crypto'91 (LNCS 576), pp. 129-140.
    • Proc. Crypto'91 , pp. 129-140
    • Pedersen, T.P.1
  • 19
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret, Commun. ACM, 22 (1979), pp 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.