메뉴 건너뛰기




Volumn 1403, Issue , 1998, Pages 127-144

Divertible protocols and atomic proxy cryptography

Author keywords

[No Author keywords available]

Indexed keywords

ATOMS; AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84957718934     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0054122     Document Type: Conference Paper
Times cited : (1324)

References (21)
  • 3
    • 85034499239 scopus 로고
    • All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions
    • [BD91], LNCS 473, Springer-Verlag
    • [BD91] Mike V. D. Burmester, Yvo Desmedt. All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions. Eurocrypt ’90 LNCS 473, Springer-Verlag 1991, 1-10.
    • (1991) Eurocrypt ’90 , pp. 1-10
    • Burmester, M.V.D.1    Desmedt, Y.2
  • 4
    • 85023982750 scopus 로고
    • An improved protocol for demonstrating possession of discrete logarithms and some generalizations
    • [CEG88], LNCS 304, Springer-Verlag
    • [CEG88] David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. Eurocrypt ’87. LNCS 304, Springer-Verlag 1988, 127-141.
    • (1988) Eurocrypt ’87 , pp. 127-141
    • Chaum, D.1    Evertse, J.-H.2    Van De Graaf, J.3
  • 5
    • 84948962858 scopus 로고
    • Blind Signatures Based on the Discrete Logarithm Problem
    • [CPS95], LNCS 950, Springer-Verlag
    • [CPS95] Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler. Blind Signatures Based on the Discrete Logarithm Problem. Eurocrypt ’94. LNCS 950, Springer-Verlag 1995, 428-432.
    • (1995) Eurocrypt ’94 , pp. 428-432
    • Camenisch, J.L.1    Piveteau, J.-M.2    Stadler, M.A.3
  • 6
    • 0008538346 scopus 로고
    • A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm
    • [DeL84]
    • [DeL84] John M. DeLaurentis. A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm. Cryptologia 8/3 (1984) 253-259.
    • (1984) Cryptologia , vol.8 , Issue.3 , pp. 253-259
    • DeLaurentis, J.M.1
  • 8
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • [E1G85]
    • [E1G85] Taher ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. 31/4 (1985) 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 9
    • 0024135240 scopus 로고
    • Zero-Knowledge Proofs of Identity
    • [FFS88]
    • [FFS88] Uriel Feige, Amos Fiat, Adi Shamir. Zero-Knowledge Proofs of Identity. Journal of Cryptology 1/2 (1988) 77-94.
    • (1988) Journal of Cryptology , vol.1-2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 10
    • 84990731886 scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • [FS87], LNCS 263, Springer-Verlag
    • [FS87] Amos Fiat, Adi Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Crypto ’86. LNCS 263, Springer-Verlag 1987, 186-194.
    • (1987) Crypto ’86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • [GMR89]
    • [GMR89] Shafi Goldwasser, Silvio Micali, Charles Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Computing. 18/1 (1989) 186-207.
    • (1989) SIAM J. Computing , vol.18 , Issue.1 , pp. 186-207
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 12
    • 84955580392 scopus 로고
    • Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications
    • [HMP95], LNCS 917, Springer-Verlag
    • [HMP95] Patrick Horster, Markus Michels, Holger Petersen. Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. Asiacrypt ’94. LNCS 917, Springer-Verlag 1995, 224-237.
    • (1995) Asiacrypt ’94 , pp. 224-237
    • Horster, P.1    Michels, M.2    Petersen, H.3
  • 13
    • 84957688681 scopus 로고
    • An encrypted key transmission protocol
    • [Hug94], presentation, August
    • [Hug94] Eric Hughes. An encrypted key transmission protocol. Crypto ’94 Rump Session presentation, August 1994.
    • (1994) Crypto ’94 Rump Session
    • Hughes, E.1
  • 14
    • 0003056823 scopus 로고
    • Any Language in IP has a Divertible ZKIP
    • [ISS91], Springer-Verlag
    • [ISS91] Toshija Itoh, Kouichi Sakurai, Hiroki Shizuya. Any Language in IP has a Divertible ZKIP. AsiaCrypt ’91. Springer-Verlag 1993, 382-396.
    • (1993) AsiaCrypt ’91 , pp. 382-396
    • Itoh, T.1    Sakurai, K.2    Shizuya, H.3
  • 15
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • [M097]
    • [M097] Masahiro Mambo, Eiji Okamoto. Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. Fund. Electronics Communications and Comp Sci. E80-A/1 (1997) 54-63.
    • (1997) IEICE Trans. Fund. Electronics Communications and Comp Sci , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 17
    • 35848959662 scopus 로고
    • A proposed federal information processing standard for digital signature standard (DSS)
    • [NIS91], August, Standards Publication (FIPS)
    • [NIS91] NIST. A proposed federal information processing standard for digital signature standard (DSS). Draft Tech. Rep. FIPS PUB XXX, August 1991. Standards Publication (FIPS)
    • (1991) Draft Tech. Rep. FIPS PUB XXX
    • NIST1
  • 18
    • 85032864442 scopus 로고
    • Divertible zero-knowledge interactive proofs and commutative random self-reducibility
    • LNCS 434, Springer-Verlag
    • Tatsuaki Okamoto, Kazuo Ohta. Divertible zero-knowledge interactive proofs and commutative random self-reducibility. Eurocrypt ’89 LNCS 434, Springer-Verlag 1990, 134-149.
    • (1990) Eurocrypt ’89 , pp. 134-149
    • Okamoto, T.1    Ohta, K.2
  • 19
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • [RSA78], reprinted: 26/1 (1983) 96-99
    • [RSA78] Ronald L. Rivest, Adi Shamir, Leonhard Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. CACM21/2 (1978) 120-126, reprinted: 26/1 (1983) 96-99.
    • (1978) CACM21/2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 20
    • 0343349510 scopus 로고
    • A "Weak" Privacy Protocol Using the RSA Crypto Algorithm
    • [Sim83]
    • [Sim83] Gustavus J. Simmons. A "Weak" Privacy Protocol Using the RSA Crypto Algorithm. Cryptologia 7/2 (1983) 180-182.
    • (1983) Cryptologia , vol.7 , Issue.2 , pp. 180-182
    • Simmons, G.J.1
  • 21
    • 0001217738 scopus 로고
    • The Prisoners’ Problem and the Subliminal Channel
    • [Sim84], Plenum Press, New York
    • [Sim84] Gustavus J. Simmons. The Prisoners’ Problem and the Subliminal Channel. Crypto ’83. Plenum Press, New York 1984, 51-67.
    • (1984) Crypto ’83 , pp. 51-67
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.