메뉴 건너뛰기




Volumn 1592, Issue , 1999, Pages 90-106

An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84957712291     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48910-X_7     Document Type: Conference Paper
Times cited : (130)

References (41)
  • 1
    • 33746365751 scopus 로고
    • Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
    • D. Beaver, “Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority", J. Cryptology (1991) 4: 75-122.
    • (1991) J. Cryptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 2
    • 0002665938 scopus 로고
    • Hiding instances in multi-oracle queries
    • D. Beaver and J. Feigenbaum, “Hiding instances in multi-oracle queries", STACS, 1990.
    • (1990) STACS
    • Beaver, D.1    Feigenbaum, J.2
  • 4
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, “Relations among notions of security for public-key encryption schemes", CRYPTO '98, 1998, pp. 26-40.
    • (1998) CRYPTO '98 , pp. 26-40
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 5
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption
    • M. Bellare and P. Rogaway, “Optimal Asymmetric Encryption", Eurocrypt '94 (LNCS 950), 92-111, 1995.
    • (1995) Eurocrypt '94 , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84898960610 scopus 로고
    • Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation", 20th STOC, 1988, pp. 1-10.
    • (1988) 20Th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 84957651500 scopus 로고    scopus 로고
    • A formal treatment of remotely keyed encryption
    • 251-165
    • M. Blaze, J. Feigenbaum and M. Naor, “A formal treatment of remotely keyed encryption", Eurocrypt '98, 1998, pp. 251-165.
    • (1998) Eurocrypt '98
    • Blaze, M.1    Feigenbaum, J.2    Naor, M.3
  • 8
    • 0010280770 scopus 로고
    • An efficient off-line electronic cash system based on the representa- tion problem
    • S. Brands, “An efficient off-line electronic cash system based on the representa- tion problem", CWI TR CS-R9323, 1993.
    • (1993) CWI TR CS-R9323
    • Brands, S.1
  • 11
    • 0000739627 scopus 로고
    • Maintaining security in the presence of transient faults
    • R. Canetti and A. Herzberg, “Maintaining security in the presence of transient faults", CRYPTO'94, 1994.
    • (1994) CRYPTO'94
    • Canetti, R.1    Herzberg, A.2
  • 13
    • 84898947315 scopus 로고    scopus 로고
    • Multi-party Unconditionally Secure Protocols
    • D. Chaum, C. Crepeau, and I. Damgard, “Multi-party Unconditionally Secure Protocols", 20th STOC, 1998, pp. 11-19.
    • (1998) 20Th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 14
    • 85023982750 scopus 로고
    • An improved protocol for demon- strating possession of discrete logarithms and some generalizations
    • D. Chaum, E. Everetse and J. van der Graaf, “An improved protocol for demon- strating possession of discrete logarithms and some generalizations", Eurocrypt '87,, LNCS 304, 1987, pp. 127-141.
    • (1987) Eurocrypt '87 , vol.304 , pp. 127-141
    • Chaum, D.1    Everetse, E.2    Van Der Graaf, J.3
  • 15
    • 0002391080 scopus 로고
    • Untraceable electronic cash
    • D. Chaum, A. Fiat and M. Naor, “Untraceable electronic cash", CRYPTO '88, LNCS 403, 1988, pp. 319-327.
    • (1988) CRYPTO '88 , vol.403 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 16
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • D. Chaum and T. Pedersen, “Wallet databases with observers", CRYPTO '92, 1992, pp. 89-105.
    • (1992) CRYPTO '92 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 17
    • 0002766455 scopus 로고    scopus 로고
    • A paractical public-key cryptosystem provably secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, “A paractical public-key cryptosystem provably secure against adaptive chosen ciphertext attack", CRYPTO '98, 1998.
    • (1998) CRYPTO '98
    • Cramer, R.1    Shoup, V.2
  • 18
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Y. Desmedt and Y. Frankel, “Threshold cryptosystems", Crypto '89 (LNCS 435), 1989, pages 307-315.
    • (1989) Crypto '89 , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 20
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive Veriffiable Secret Sharing
    • P. Feldman, “A practical scheme for non-interactive Veriffiable Secret Sharing", 28th FOCS, 1987, pp. 427-437.
    • (1987) 28Th FOCS , pp. 427-437
    • Feldman, P.1
  • 21
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identiffi- cation and signature problems
    • A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identiffi- cation and signature problems", CRYPTO'86 (LNCS 263), 186-194, 1986.
    • (1986) CRYPTO'86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 24
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient shar- ing of RSA functions
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Robust and efficient shar- ing of RSA functions, CRYPTO '96, 1996, pp. 157-172.
    • (1996) CRYPTO '96 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 25
    • 84888872516 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • R. Gennaro and V. Shoup, “Securing threshold cryptosystems against chosen ciphertext attack", Eurocrypt '98, 1998, pp. 1-16.
    • (1998) Eurocrypt '98 , pp. 1-16
    • Gennaro, R.1    Shoup, V.2
  • 27
    • 0012527958 scopus 로고
    • Fair Computation of General Functions in Pres- ence of Immoral Majority
    • S. Goldwasser, and L. Levin, “Fair Computation of General Functions in Pres- ence of Immoral Majority", CRYPTO, 1990.
    • (1990) CRYPTO
    • Goldwasser, S.1    Levin, L.2
  • 28
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • April
    • S. Goldwasser and S. Micali, “Probabilistic encryption", JCSS, Vol. 28, No 2, April 1984, pp. 270-299.
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 29
    • 84957626176 scopus 로고
    • Proactive Secret Sharing or: How to Cope with Perpetual Leakage
    • A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung “Proactive Secret Sharing or: How to Cope with Perpetual Leakage", CRYPTO '95, LNCS 963, 1995. pp. 339-352.
    • (1995) CRYPTO '95 , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 33
    • 0024983231 scopus 로고
    • Public key cryptosystems provably secure against chosen ciphertext attacks
    • M. Naor and M. Yung, “Public key cryptosystems provably secure against chosen ciphertext attacks", 22nd STOC, 427-437, 1990.
    • (1990) 22Nd STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 34
    • 85027164480 scopus 로고
    • How to withstand mobile virus attacks
    • R. Ostrovsky and M. Yung. “How to withstand mobile virus attacks". 10th PODC, 1991, pp. 51-59.
    • (1991) 10Th PODC , pp. 51-59
    • Ostrovsky, R.1    Yung, M.2
  • 35
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • T. Pedersen, “A threshold cryptosystem without a trusted party", Eurocrypt '91, 1991, pp. 522-526.
    • (1991) Eurocrypt '91 , pp. 522-526
    • Pedersen, T.1
  • 36
    • 0000129601 scopus 로고
    • Distributed provers with applications to undeniable signatures
    • T. Pedersen. Distributed provers with applications to undeniable signatures. Eurocrypt '91, 1991.
    • (1991) Eurocrypt '91
    • Pedersen, T.1
  • 37
    • 0024859552 scopus 로고
    • Veriffiable Secret Sharing and Multi-party Protocols with Honest Majority
    • T. Rabin and M. Ben-Or, “Veriffiable Secret Sharing and Multi-party Protocols with Honest Majority", 21st STOC, 1989, pp. 73-85.
    • (1989) 21St STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 38
    • 0002360237 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • C. Racko_ and D. Simon, “Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack", CRYPTO '91, 1991.
    • (1991) CRYPTO '91
    • Racko_, C.1    Simon, D.2
  • 39
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. “How to Share a Secret", Communications of the ACM, 22:612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 40
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr, “Efficient signature generation by smart cards", J. Cryptology 4:161- 174, 1991.
    • (1991) J. Cryptology , vol.4
    • Schnorr, C.1
  • 41
    • 84957623411 scopus 로고    scopus 로고
    • 17th Conf. on Foundations of Software Technology and Theoretical Computer Science, Kharapur, India, Available on-line at theory.lcs.mit.edu/~madhu/
    • M. Sudan, “Algorithmic issues in coding theorey", 17th Conf. on Foundations of Software Technology and Theoretical Computer Science, Kharapur, India, 1997. Available on-line at theory.lcs.mit.edu/~madhu/
    • (1997) Algorithmic Issues in Coding Theorey
    • Sudan, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.