메뉴 건너뛰기




Volumn 1592, Issue , 1999, Pages 327-346

Distributed pseudo-random functions and KDCs

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84957653598     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48910-X_23     Document Type: Conference Paper
Times cited : (154)

References (44)
  • 2
    • 85017331614 scopus 로고    scopus 로고
    • Efficient Algorithms, The MIT Press
    • Bach E. and Shallit J., Algorithmic Number Theory, vol. 1: Efficient Algorithms, The MIT Press, 1996, pp. 155-163.
    • (1996) Algorithmic Number Theory , vol.1 , pp. 155-163
    • Bach, E.1    Shallit, J.2
  • 3
    • 0003745894 scopus 로고    scopus 로고
    • Secure schemes for secret sharing and key distribution
    • Beimel A., “Secure schemes for secret sharing and key distribution", DScdissertation, 1996.
    • (1996) Dscdissertation
    • Beimel, A.1
  • 6
    • 84898960610 scopus 로고
    • Completeness theorems for non cryptographic fault tolerant distributed computation, 20th Proc
    • BenOr M., Goldwasser S. and Wigderson A., Completeness theorems for non cryptographic fault tolerant distributed computation, 20th Proc. ACM Symp. On Theory of Computing, (1988), 1-9.
    • (1988) ACM Symp. on Theory of Computing , pp. 1-9
    • Benor, M.1    Goldwasser, S.2    Wigderson, A.3
  • 8
    • 84957651500 scopus 로고    scopus 로고
    • A Formal Treatment of Remotely Keyed Encryption
    • Springer-Verlag
    • Blaze M,, Feigenbaum J. and Naor M., “A Formal Treatment of Remotely Keyed Encryption", Advances in Cryptology - Eurocrypt'98, LNCS 1403, Springer-Verlag, 1998, pp. 251-265.
    • (1998) Advances in Cryptology - Eurocrypt'98 , vol.1403 , pp. 251-265
    • Blaze, M.1    Feigenbaum, J.2    Naor, M.3
  • 9
    • 84947778144 scopus 로고    scopus 로고
    • The Decision DifieHellman Problem"
    • Springer-Verlag
    • D. Boneh, “The Decision DifieHellman Problem", Proc. of the Third Algorithmic Number Theory Symp., LNCS Vol. 1423, Springer-Verlag, pp. 48-63, 1998.
    • (1998) Proc. of the Third Algorithmic Number Theory Symp , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 10
    • 0842305659 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • LNCS, Springer
    • Canetti R., Towards realizing random oracles: hash functions that hide all partial information, CRYPTO '97, LNCS, Springer, 1997, pp. 455-469.
    • (1997) CRYPTO '97 , pp. 455-469
    • Canetti, R.1
  • 13
    • 0005033406 scopus 로고    scopus 로고
    • An efficient threshold public-key cryptosystem secure against chosen ciphertext attack
    • Springer-Verlag
    • Canetti R. and Goldwasser S., “An efficient threshold public-key cryptosystem secure against chosen ciphertext attack", Advances in Cryptology - Eurocrypt '99, Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - Eurocrypt '99
    • Canetti, R.1    Goldwasser, S.2
  • 19
    • 0027341860 scopus 로고
    • Perfectly secure message transmission"
    • Dolev D., Dwork C., Waarts O. and Yung M., “Perfectly secure message transmission", JACM 40(1):17-47, 1993.
    • (1993) JACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 20
    • 0031210863 scopus 로고    scopus 로고
    • An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement
    • Feldman P. and S. Micali, “An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement", Siam J. Comp. 26, 1997, pp. 873-933.
    • (1997) Siam J. Comp , vol.26 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 21
    • 0011000478 scopus 로고    scopus 로고
    • An introduction to threshold cryptography
    • Gemmell P., “An introduction to threshold cryptography", CryptoBytes, Winter 97, 7-12, 1997.
    • (1997) Cryptobytes, Winter , vol.97 , pp. 7-12
    • Gemmell, P.1
  • 24
    • 0022793132 scopus 로고
    • How to construct random functions"
    • Goldreich O., Goldwasser S. and Micali S., “How to construct random functions", J. of the ACM, Vol. 33, No. 4, (1986), 691-729.
    • (1986) J. of the ACM , vol.33 , Issue.4 , pp. 691-729
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 26
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • Gong L., “Increasing availability and security of an authentication service", IEEE J. SAC, Vol. 11, No. 5, (1993), 657-662.
    • (1993) IEEE J. SAC , vol.11 , Issue.5 , pp. 657-662
    • Gong, L.1
  • 30
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon Codes
    • McEliece R. J. and Sarwate D. V., “On sharing secrets and Reed-Solomon Codes", Comm. ACM, Vol. 24, No. 9, 1981, 583-584.
    • (1981) Comm. ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 31
    • 84957658795 scopus 로고    scopus 로고
    • A simple method for generating and sharing pseudo- random functions, with applications to clipper-like key escrow systems
    • Springer
    • Micali S. and Sidney R., “A simple method for generating and sharing pseudo- random functions, with applications to clipper-like key escrow systems", Adv. In Cryptology - Crypto '95, Springer, 185-196.
    • Adv. in Cryptology - Crypto '95 , pp. 185-196
    • Micali, S.1    Sidney, R.2
  • 32
    • 84957701776 scopus 로고    scopus 로고
    • Secure and efficient metering
    • Springer-Verlag
    • Naor M. and Pinkas B., Secure and efficient metering, Advances in Cryptology - Eurocrypt '98, LNCS 1403, Springer-Verlag, 1998, pp. 576-590.
    • (1998) Advances in Cryptology - Eurocrypt '98 , vol.1403 , pp. 576-590
    • Naor, M.1    Pinkas, B.2
  • 35
    • 0029510686 scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions"
    • Naor M. and O. Reingold, “Synthesizers and their application to the parallel construction of pseudo-random functions", Proc. 36th IEEE Symp. on Foundations of Computer Science, 1995, pp. 170-181.
    • (1995) Proc. 36Th IEEE Symp. on Foundations of Computer Science , pp. 170-181
    • Naor, M.1    Reingold, O.2
  • 36
    • 84937608081 scopus 로고    scopus 로고
    • Number-Theoretic constructions of efficient pseudo- random functions
    • Naor M. and Reingold O., “Number-Theoretic constructions of efficient pseudo- random functions", Proc. 38th IEEE FOCS, 1997.
    • (1997) Proc. 38Th IEEE FOCS
    • Naor, M.1    Reingold, O.2
  • 37
    • 84957617971 scopus 로고    scopus 로고
    • From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs
    • Naor M. and O. Reingold, “From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs", Advances in CryptologyCRYPTO '98, 1998, pp. 267-282.
    • (1998) Advances in Cryptologycrypto '98 , pp. 267-282
    • Naor, M.1    Reingold, O.2
  • 38
    • 0002957803 scopus 로고    scopus 로고
    • The load, capacity, and availability of quorum systems
    • April
    • Naor M. and Wool A., “The load, capacity, and availability of quorum systems", SIAM J. Comput., Vol. 27, No. 2, 423-447, April 1998.
    • (1998) J. Comput , vol.27 , Issue.2 , pp. 423-447
    • Naor, M.1    Wool, A.2
  • 40
    • 0018048246 scopus 로고
    • Using encryption for authentication in large net- works of computers
    • December
    • Needham R. and Schroeder M., “Using encryption for authentication in large net- works of computers", Comm. ACM, Vol. 21, No. 12, 993-999, December 1978.
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 41
    • 0020829007 scopus 로고
    • Transaction Protection by Beacons"
    • Rabin M. O., “Transaction Protection by Beacons", JCSS, Vol. 27, No. 2, (1983), 256-267.
    • (1983) JCSS , vol.27 , Issue.2 , pp. 256-267
    • Rabin, M.O.1
  • 42
    • 84957689308 scopus 로고    scopus 로고
    • A Simpliffied Approach to Threshold and Proactive RSA
    • Rabin T., “A Simpliffied Approach to Threshold and Proactive RSA", Advances in Cryptology - CRYPTO '98, 1998, pp. 89-104.
    • (1998) Advances in Cryptology - CRYPTO '98 , pp. 89-104
    • Rabin, T.1
  • 43
    • 0000537828 scopus 로고
    • Efficient identiffication and signatures for smart cards
    • LNCS, Springer-Verlag
    • Schnorr C. P., Efficient identiffication and signatures for smart cards, Proc. Advances in Cryptology - CRYPTO '89, LNCS, Springer-Verlag, 1990, pp. 239-252.
    • (1990) Proc. Advances in Cryptology - CRYPTO '89 , pp. 239-252
    • Schnorr, C.P.1
  • 44
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • Shamir A., “How to share a secret", Comm. ACM Vol. 22, No. 11 (Nov. 1979), 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.