메뉴 건너뛰기




Volumn 1462, Issue , 1998, Pages 89-104

A simplified approach to threshold and proactive RSA

Author keywords

Proactive signatures; RSA; Threshold and proactive RSA; Threshold signatures

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84957689308     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055722     Document Type: Conference Paper
Times cited : (161)

References (27)
  • 1
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • Springer-Verlag. LNCS No. 1294. [BF97]
    • [BF97] D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Crypto '97, pages 425-439, 1997. Springer-Verlag. LNCS No. 1294.
    • (1997) Crypto '97 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 3
    • 0002181960 scopus 로고
    • Digital Multisignatures
    • H. Baker and F. Piper, editors, Claredon Press[Boy89]
    • [Boy89] C. Boyd. Digital Multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241-246. Claredon Press, 1989.
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 4
    • 0013001552 scopus 로고    scopus 로고
    • Proactive Security: Long-term Protextion Against Break-ins
    • [CGHN97]
    • [CGHN97] R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive Security: Long-term Protextion Against Break-ins. CryptoBytes, 3(1):1-8, 1997.
    • (1997) CryptoBytes , vol.3 , Issue.1 , pp. 1-8
    • Canetti, R.1    Gennaro, R.2    Herzberg, A.3    Naor, D.4
  • 5
    • 0003200675 scopus 로고
    • Public-key cryptography and re-usable shared secrets
    • H. Baker and F. Piper, editorsClaredon Press[CH89]
    • [CH89] R. A. Croft and S. P. Harris. Public-key cryptography and re-usable shared secrets. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 189-201. Claredon Press, 1989.
    • (1989) Cryptography and Coding , pp. 189-201
    • Croft, R.A.1    Harris, S.P.2
  • 6
    • 84984842401 scopus 로고
    • Maintaining security in the presence of transient faults
    • Springer-Verlag. LNCS No. 839. [CH94]
    • [CH94] R. Canetti and Amir Herzberg. Maintaining security in the presence of transient faults. Crypto '94, pages 425-438, 1994. Springer-Verlag. LNCS No. 839.
    • (1994) Crypto '94 , pp. 425-438
    • Canetti, R.1    Herzberg, A.2
  • 7
    • 0027580298 scopus 로고
    • Efficient and secure multiparty generation of digital signatures based on discrete logarithms
    • [CMI93]
    • [CMI93] M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Trans. Fundamentals, E76-A(4):532-545, 1993.
    • (1993) IEICE Trans. Fundamentals , vol.E76-A , Issue.4 , pp. 532-545
    • Cerecedo, M.1    Matsumoto, T.2    Imai, H.3
  • 9
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Berlin, Springer-Verlag. LNCS No. 293. [Des87]
    • [Des87] Yvo Desmedt. Society and group oriented cryptography: A new concept. In Crypto '87, pages 120-127, Berlin, 1987. Springer-Verlag. LNCS No. 293.
    • (1987) Crypto '87 , pp. 120-127
    • Desmedt, Y.1
  • 11
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • G. Brassard, editor, Berlin, Springer-Verlag. LNCS No. 435. [DF89]
    • [DF89] Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology-Crypto '89, pages 307-315, Berlin, 1989. Springer-Verlag. LNCS No. 435.
    • (1989) Advances in Cryptology-Crypto '89 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 12
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • J. Feigenbaum, editor, Berlin, Springer-Verlag. LNCS No. 576. [DF91]
    • [DF91] Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In J. Feigenbaum, editor, Advances in Cryptology-Crypto '91, pages 457-469, Berlin, 1991. Springer-Verlag. LNCS No. 576.
    • (1991) Advances in Cryptology-Crypto '91 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 13
    • 0038061165 scopus 로고    scopus 로고
    • Redistributing secret shares to new access structures and its applications
    • George Mason University, July 1997. [DJ97]
    • [DJ97] Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its applications. Tech. Report ISSE-TR-97-01, George Mason University, July 1997. ftp://isse.gmu.edu/pub/techrep/97_01-jajodia.ps.gz.
    • Tech. Report ISSE-TR-97-01
    • Desmedt, Y.1    Jajodia, S.2
  • 15
    • 0023538330 scopus 로고
    • A Practical Scheme for Non-Interactive Verifiable Secret Sharing
    • IEEE, [Fel87]
    • [Fel87] P. Feldman. A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In Proc. 28th Annual FOCS, pages 427-437. IEEE, 1987.
    • (1987) Proc. 28th Annual FOCS , pp. 427-437
    • Feldman, P.1
  • 16
    • 84958676203 scopus 로고    scopus 로고
    • Proactive RSA
    • Springer-Verlag. LNCS No. 1294. [FGMY97a]
    • [FGMY97a] Yair Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Proactive RSA. In Crypto '97, pages 440-454, 1997. Springer-Verlag. LNCS No. 1294.
    • (1997) Crypto '97 , pp. 440-454
    • Frankel, Y.1    Gemmell, P.2    Mackenzie, P.3    Yung, M.4
  • 17
    • 0031375570 scopus 로고    scopus 로고
    • Optimal resilience proactive public-key cryptosystems
    • IEEE, [FGMY97b]
    • [FGMY97b] Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In Proc. 38th FOCS, pages 384-393. IEEE, 1997.
    • (1997) Proc. 38th FOCS , pp. 384-393
    • Frankel, Y.1    Gemmell, P.2    Mackenzie, P.3    Yung, M.4
  • 18
    • 0029713931 scopus 로고    scopus 로고
    • Witness-based Cryptographic Program Checking and Robust Function Sharing
    • ACM, [FGY96]
    • [FGY96] Y. Frankel, P. Gemmell, and M. Yung. Witness-based Cryptographic Program Checking and Robust Function Sharing. In Proc. 28th STOC, pages 499-508. ACM, 1996.
    • (1996) Proc. 28th STOC , pp. 499-508
    • Frankel, Y.1    Gemmell, P.2    Yung, M.3
  • 19
    • 84894281582 scopus 로고
    • An Optimal Algorithm for Synchronous Byzantine Agreement
    • ACM, [FM88]
    • [FM88] P. Feldman and S. Micali. An Optimal Algorithm for Synchronous Byzantine Agreement. In Proc. 20th STOC, pages 148-161. ACM, 1988.
    • (1988) Proc. 20th STOC , pp. 148-161
    • Feldman, P.1    Micali, S.2
  • 20
    • 0039241746 scopus 로고
    • A practical protocol for large group oriented networks
    • Springer-Verlag. LNCS No. 434. [Fra89]
    • [Fra89] Y. Frankel. A practical protocol for large group oriented networks. In Eurocrypt '89, pages 56-61, 1989. Springer-Verlag. LNCS No. 434.
    • (1989) Eurocrypt '89 , pp. 56-61
    • Frankel, Y.1
  • 21
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure faut-tolerant protocols and the public-key model
    • Springer-Verlag. LNCS No. 293. [GHY87]
    • [GHY87] Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure faut-tolerant protocols and the public-key model. In Crypto '87, pages 135-155, 1987. Springer-Verlag. LNCS No. 293.
    • (1987) Crypto '87 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 22
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Springer-Verlag. LNCS No. 1070. [GJKR96a]
    • [GJKR96a] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Eurocrypt '96, pages 354-371, 1996. Springer-Verlag. LNCS No. 1070.
    • (1996) Eurocrypt '96 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 23
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • Springer-Verlag. LNCS No. 1109. [GJKR96b]
    • [GJKR96b] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Crypto '96, pages 157-172, 1996. Springer-Verlag. LNCS No. 1109.
    • (1996) Crypto '96 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 24
    • 0028508211 scopus 로고
    • Group oriented (t,n) digital signature scheme
    • Sept [Har94]
    • [Har94] L. Ham. Group oriented (t,n) digital signature scheme. IEE Proc.-Comput.Digit. Tech, 141(5):307-313, Sept 1994.
    • (1994) IEE Proc.-Comput.Digit. Tech , vol.141 , Issue.5 , pp. 307-313
    • Ham, L.1
  • 27
    • 85027164480 scopus 로고
    • How to withstand mobile virus attacks
    • ACM, [OY91]
    • [OY91] R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proc. 10th PODC, pages 51-59. ACM, 1991.
    • (1991) Proc. 10th PODC , pp. 51-59
    • Ostrovsky, R.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.