메뉴 건너뛰기




Volumn 921, Issue , 1995, Pages 133-146

Quantum oblivious mutual identification

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; QUANTUM OPTICS; QUANTUM THEORY; SMART CARDS;

EID: 84957700505     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-49264-X_11     Document Type: Conference Paper
Times cited : (29)

References (26)
  • 7
    • 0020913618 scopus 로고
    • On computationally secure authentication tags requiring short secret shared keys
    • Plenum Press
    • Brassard, G., On computationally secure authentication tags requiring short secret shared keys, Advances in Cryptology: Proceedings of CRYPTO 82, Plenum Press, 1983, pp.79-86.
    • (1983) Advances in Cryptology: Proceedings of CRYPTO 82 , pp. 79-86
    • Brassard, G.1
  • 8
    • 6544287071 scopus 로고
    • Cryptology column — Quantum cryptography
    • Brassard, G., Cryptology column — Quantum cryptography: A bibliography, Sigact News, vol. 24, no. 3, 1993, pp.16-20.
    • (1993) A Bibliography, Sigact News , vol.24 , Issue.3 , pp. 16-20
    • Brassard, G.1
  • 9
    • 0019572642 scopus 로고
    • New Hash Functions and Their Use in Authen­tication and Set Equality
    • Carter, J.L., M. N. Wegman, New Hash Functions and Their Use in Authen­tication and Set Equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Carter, J.L.1    Wegman, M.N.2
  • 11
    • 21144435910 scopus 로고
    • Efficient reductions among oblivious transfer protocols based on new self-intersecting codes
    • Springer- Verlag
    • Crepeau, C. and M. Santha. Efficient reductions among oblivious transfer protocols based on new self-intersecting codes. In Sequences II, Methods in Communications, Security, and Computer Science, pp. 360-368. Springer- Verlag, 1991.
    • (1991) Sequences II, Methods in Communications, Security, and Computer Science , pp. 360-368
    • Crepeau, C.1    Santha, M.2
  • 13
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts”
    • Even, S., Goldreich, O. and Lempel, A., “A randomized protocol for signing contracts”, Communications of the ACM, vol. 28, 1985, pp.637-647.
    • (1985) Communications of the ACM , vol.28 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 14
    • 84957677110 scopus 로고
    • Comparing Common Secret Information without Leaking it, submitted for publication
    • Fagin, R., M. Naor and P. Winkler, Comparing Common Secret Information without Leaking it, submitted for publication, Communications of the ACM, 1994.
    • (1994) Communications of the ACM
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 15
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to iden­tification and signature problems
    • In A. M. Odlyzko, editor, Springer, Lecture Notes in Computer Science No
    • Fiat, A and A. Shamir. How to prove yourself: practical solutions to iden­tification and signature problems. In A. M. Odlyzko, editor, Proceedings CRYPTO 86, pages 186-194. Springer, 1987. Lecture Notes in Computer Science No. 263.
    • (1987) Proceedings CRYPTO 86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 21
    • 0013099162 scopus 로고
    • Quantum Oblivious Transfer is Secure Against Indi­vidual Measurements
    • Dallas
    • Mayers, D., L. Salvail, Quantum Oblivious Transfer is Secure Against Indi­vidual Measurements, In the Proceedings of PHYSCOMP 94, Dallas, 1994, pp. 69-77.
    • (1994) In the Proceedings of PHYSCOMP 94 , pp. 69-77
    • Mayers, D.1    Salvail, L.2
  • 22
    • 84956073647 scopus 로고    scopus 로고
    • Experimental demonstration of quan­tum cryptography using polarized photons in optical fiber over more than 1 km
    • 20 August 1993
    • Muller, A., Breguet, J. and Gisin, N., Experimental demonstration of quan­tum cryptography using polarized photons in optical fiber over more than 1 km In Europhysics Letters, vol. 23, no. 6, 20 August 1993, pp..383-388.
    • Europhysics Letters , vol.23 , Issue.6 , pp. 383-388
    • Muller, A.1    Breguet, J.2    Gisin, N.3
  • 23
  • 24
    • 84934371820 scopus 로고
    • Master the­sis, Departement d’informatique et de Recherche Operationnelle, Universite de Montreal, Montreal, Quebec, Canada
    • Robert, J.-M., Detection et. correction d’erreur en crypt.ographie, Master the­sis, Departement d’informatique et de Recherche Operationnelle, Universite de Montreal, Montreal, Quebec, Canada, 1985.
    • (1985) Detection Et. Correction d’erreur En Crypt.Ographie
    • Robert, J.-M.1
  • 26
    • 84957657050 scopus 로고    scopus 로고
    • New York Times, 13 May 1993
    • One Less Thing to Believe In: Fraud at Fake Cash Machine, New York Times, 13 May 1993, pp. A1-B9.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.