메뉴 건너뛰기




Volumn 1403, Issue , 1998, Pages 17-31

Auto-recoverable auto-certifiable cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 84957673202     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0054114     Document Type: Conference Paper
Times cited : (37)

References (24)
  • 3
    • 0017018484 scopus 로고
    • New Directions in Cryptography
    • [DH76], Nov
    • [DH76] W. Diffie, M. Heilman. New Directions in Cryptography. In volume IT-22, n. 6 of IEEE Transactions on Information Theory, pages 644-654, Nov. 1976.
    • (1976) IEEE Transactions on Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Heilman, M.2
  • 4
    • 0004272148 scopus 로고
    • [Du78], 2nd edition, W. H. Freeman and Co
    • [Du78] U. Dudley. Elementary Number Theory. 2nd edition, pages 36, 37, 75, 1978. W. H. Freeman and Co.
    • (1978) Elementary Number Theory
    • Dudley, U.1
  • 5
    • 85032883059 scopus 로고    scopus 로고
    • A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • [E1G85]
    • [E1G85] T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO ’84, pages 10-18.
    • CRYPTO ’84 , pp. 10-18
    • ElGamal, T.1
  • 6
    • 85023809951 scopus 로고    scopus 로고
    • Threshold Cryptosystems
    • [FD89]
    • [FD89] Y. Frankel, Y. Desmedt. Threshold Cryptosystems. In CRYPTO ’89, pages 307-315.
    • CRYPTO ’89 , pp. 307-315
    • Frankel, Y.1    Desmedt, Y.2
  • 8
    • 84990731886 scopus 로고    scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • [FS86]
    • [FS86] A. Fiat, A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO ’86, pages 186-194.
    • CRYPTO ’86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 9
    • 84957693910 scopus 로고    scopus 로고
    • Escrow Encryption Systems Visited: Attacks, Analysis and Designs
    • [FY95]
    • [FY95] Y. Frankel, M. Yung. Escrow Encryption Systems Visited: Attacks, Analysis and Designs. In CRYPTO ’95, pages 222-235
    • CRYPTO ’95 , pp. 222-235
    • Frankel, Y.1    Yung, M.2
  • 10
    • 84957609490 scopus 로고    scopus 로고
    • On characterization of Escrow Encryption Schemes
    • [FY97]
    • [FY97] Y. Frankel, M. Yung. On characterization of Escrow Encryption Schemes. In ICALP ’97.
    • ICALP ’97
    • Frankel, Y.1    Yung, M.2
  • 11
    • 85034643663 scopus 로고    scopus 로고
    • Symmetric public-key encryption
    • [GHY85]
    • [GHY85] Z. Galil, S. Haber, M. Yung. Symmetric public-key encryption. In CRYPTO ’85, pages 128-137.
    • CRYPTO ’85 , pp. 128-137
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 15
    • 84957640277 scopus 로고
    • Fair Cryptosystems Revisited
    • [KL95], Springer-Verlag
    • [KL95] J. Kilian and F.T. Leighton. Fair Cryptosystems Revisited. In CRYPTO ’95, pages 208-221, 1995. Springer-Verlag.
    • (1995) CRYPTO ’95 , pp. 208-221
    • Kilian, J.1    Leighton, F.T.2
  • 16
    • 0012167855 scopus 로고
    • [Koh78], MIT Lab. for Computer Science, Cambridge Mass., May
    • [Koh78] L. Kohnfelder. A Method for Certification. MIT Lab. for Computer Science, Cambridge Mass., May 1978.
    • (1978) A Method for Certification
    • Kohnfelder, L.1
  • 18
    • 84947439162 scopus 로고
    • A Key Escrow System with Warrant Bounds
    • [LWY95]
    • [LWY95] A. Lenstra, P. Winkler, Y. Yacobi. A Key Escrow System with Warrant Bounds. In CRYPTO ’95, pages 197-207, 1995.
    • (1995) CRYPTO ’95 , pp. 197-207
    • Lenstra, A.1    Winkler, P.2    Yacobi, Y.3
  • 19
    • 0010216321 scopus 로고
    • Fair Public-Key Cryptosystems
    • [Mi92], Springer-Verlag
    • [Mi92] S. Micali. Fair Public-Key Cryptosystems. In CRYPTO ’92, pages 113-138, 1992. Springer-Verlag.
    • (1992) CRYPTO ’92 , pp. 113-138
    • Micali, S.1
  • 21
    • 84957370092 scopus 로고    scopus 로고
    • Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
    • [VT97]
    • [VT97] E. Verheul, H. van Tilborg. Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. In Eurocrypt ’97, pages 119-133, 1997.
    • (1997) Eurocrypt ’97 , pp. 119-133
    • Verheul, E.1    van Tilborg, H.2
  • 22
    • 84955586344 scopus 로고    scopus 로고
    • The Dark Side of Black-Box Cryptography
    • [YY96]
    • [YY96] A. Young, M. Yung. The Dark Side of Black-Box Cryptography. In CRYPTO ’96, pages 89-103
    • CRYPTO ’96 , pp. 89-103
    • Young, A.1    Yung, M.2
  • 23
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using Cryptography against Cryptography
    • [YY97a]
    • [YY97a] A. Young, M. Yung. Kleptography: Using Cryptography against Cryptography. In Eurocrypt ’97, pages 62-74.
    • Eurocrypt ’97 , pp. 62-74
    • Young, A.1    Yung, M.2
  • 24
    • 84958645678 scopus 로고    scopus 로고
    • The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems
    • [YY97b]
    • [YY97b] A. Young, M. Yung. The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. In CRYPTO ’97, pages 264-276.
    • CRYPTO ’97 , pp. 264-276
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.