메뉴 건너뛰기




Volumn 1751, Issue , 2000, Pages 1-13

A practical and secure fault-tolerant conference-key agreement protocol

Author keywords

[No Author keywords available]

Indexed keywords

CHROMIUM COMPOUNDS; FAULT TOLERANCE; NETWORK SECURITY;

EID: 84957807365     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-46588-1_1     Document Type: Conference Paper
Times cited : (21)

References (30)
  • 1
  • 3
    • 85030481487 scopus 로고
    • Advances in Cryptology: Proceedings of Eurocrypt’91, Lecture Notes in Computer Science 547, Springer-Verlag
    • S. Berkovits, ”How to Broadcast a Secret”, Advances in Cryptology: Proceedings of Eurocrypt’91, Lecture Notes in Computer Science 547, Springer-Verlag, pp.535-541, 1991.
    • (1991) ”How to Broadcast a Secret” , pp. 535-541
    • Berkovits, S.1
  • 4
    • 84884730529 scopus 로고
    • Advances in Cryptology: Proceedings of Eurocrypt’84, Lecture Notes in Computer Science 196, Springer-Verlag
    • R. Blom, ”An Optimal Class of Symmetric Key Generation Systems”, Advances in Cryptology: Proceedings of Eurocrypt’84, Lecture Notes in Computer Science 196, Springer-Verlag, pp.335-338, 1985.
    • (1985) An Optimal Class of Symmetric Key Generation Systems , pp. 335-338
    • Blom, R.1
  • 6
    • 84955621986 scopus 로고    scopus 로고
    • ”Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Problems”, Advances in Cryptology: Proceedings of Crypto’96, Lecture Notes in Computer Science 1109
    • D. Boneh, R. Venkatesan, ”Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Problems”, Advances in Cryptology: Proceedings of Crypto’96, Lecture Notes in Computer Science 1109, Springer-Verlag, pp.129-142, 1996.
    • (1996) Springer-Verlag , pp. 129-142
    • Boneh, D.1    Venkatesan, R.2
  • 7
    • 84948991087 scopus 로고
    • Advances in Cryptology: Proceedings of Eurocrypt’94, Lecture Notes in Computer Science 950, Springer-Verlag
    • M. Burmester, Y. Desmedt, ”A Secure and Efficient Conference Key Distribution System”, Advances in Cryptology: Proceedings of Eurocrypt’94, Lecture Notes in Computer Science 950, Springer-Verlag, pp.275-286, 1995.
    • (1995) ”A Secure and Efficient Conference Key Distribution System” , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 10
    • 84957801156 scopus 로고
    • ”The Design of a Conference Key Distribution System”, Advances in Cryptology: Proceedings of Auscrypt’92
    • C.C. Chang, T.C. Wu, C.P. Chen, ”The Design of a Conference Key Distribution System”, Advances in Cryptology: Proceedings of Auscrypt’92, Lecture Notes in Computer Science 718, Springer-Verlag, pp.459-466, 1992.
    • (1992) Lecture Notes in Computer Science 718, Springer-Verlag , pp. 459-466
    • Chang, C.C.1    Wu, T.C.2    Chen, C.P.3
  • 13
    • 0028017207 scopus 로고
    • Identity-Based Conference Key Broadcast Systems
    • T. Hwang, J.L. Chen, ”Identity-Based Conference Key Broadcast Systems”, IEE Computers and Digital Techniques, Vol. 141, No. 1, pp.57-60, 1994.
    • (1994) IEE Computers and Digital Techniques , vol.141 , Issue.1 , pp. 57-60
    • Hwang, T.1    Chen, J.L.2
  • 16
    • 84957796369 scopus 로고
    • Advances in Cryptology: Proceedings of Eurocrypt’92, Lecture Notes in Computer Science 658, Springer-Verlag
    • K. Koyama, ”Secure Conference Key Distribution Schemes for Conspiracy Attack”, Advances in Cryptology: Proceedings of Eurocrypt’92, Lecture Notes in Computer Science 658, Springer-Verlag, pp.449-453, 1993.
    • (1993) Secure Conference Key Distribution Schemes for Conspiracy Attack , pp. 449-453
    • Koyama, K.1
  • 17
    • 84990736101 scopus 로고
    • Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag
    • K. Koyama, K. Ohta, ”Identity-Based Conference Key Distribution Systems”, Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp.175-184, 1988.
    • (1988) Identity-Based Conference Key Distribution Systems , pp. 175-184
    • Koyama, K.1    Ohta, K.2
  • 18
    • 84990740394 scopus 로고
    • Advances in Cryptology: Proceedings of Eurocrypt’88, Lecture Notes in Computer Science 330, Springer-Verlag
    • K. Koyama, K. Ohta, ”Security of Improved Identity-Based Conference Key Distributioin Systems”, Advances in Cryptology: Proceedings of Eurocrypt’88, Lecture Notes in Computer Science 330, Springer-Verlag, pp.11-19, 1988.
    • (1988) Security of Improved Identity-Based Conference Key Distributioin Systems , pp. 11-19
    • Koyama, K.1    Ohta, K.2
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, ”How to share a secret”, Communications of the ACM, Vol. 22, pp.612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 26
    • 84957810610 scopus 로고
    • Advances in Cryptology: Proceedings of Asiacrypt’91, Lecture Notes in Computer Science 739, Springer-Verlag
    • A. Shimbo, S. I. Kawamura, ”Cryptanalysis of Several Conference Key Distribution Schemes”, Advances in Cryptology: Proceedings of Asiacrypt’91, Lecture Notes in Computer Science 739, Springer-Verlag, pp.265-276, 1993.
    • (1993) Cryptanalysis of Several Conference Key Distribution Schemes , pp. 265-276
    • Shimbo, A.1    Kawamura, S.I.2
  • 27
    • 84942550160 scopus 로고    scopus 로고
    • Advances in Cryptology: Proceedings of Eurocrypt’97, Lecture Notes in Computer Science 1233, Springer-Verlag
    • V. Shoup, ”Lower Bounds for Discrete Logarithms and Related Problems”, Advances in Cryptology: Proceedings of Eurocrypt’97, Lecture Notes in Computer Science 1233, Springer-Verlag, pp.256-266, 1997.
    • (1997) Lower Bounds for Discrete Logarithms and Related Problems , pp. 256-266
    • Shoup, V.1
  • 28
    • 84978523717 scopus 로고
    • Advances in Cryptology: Proceedings of Crypto’88, Lecture Notes in Computer Science 409, Springer-Verlag
    • D.G. Steer, L. Strawczynski, W. Diffie, M. Wiener, ”A Secure Audio Teleconference System”, Advances in Cryptology: Proceedings of Crypto’88, Lecture Notes in Computer Science 409, Springer-Verlag, pp.520-528, 1990.
    • (1990) A Secure Audio Teleconference System , pp. 520-528
    • Steer, D.G.1    Strawczynski, L.2    Diffie, W.3    Wiener, M.4
  • 29
    • 0031098126 scopus 로고    scopus 로고
    • Conference Key Distribution System with User Anonymity Based on Algebraic Approach
    • T.C. Wu, ”Conference Key Distribution System with User Anonymity Based on Algebraic Approach”, Proceedings of IEE Computers and Digital Techniques, Vol. 144, No 2, pp.145-148, 1997.
    • (1997) Proceedings of IEE Computers and Digital Techniques , vol.144 , Issue.2 , pp. 145-148
    • Wu, T.C.1
  • 30
    • 84863285641 scopus 로고
    • Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag
    • Y. Yacobi, ”Attack on the Koyama-Ohta Identity Based Key Distribution Scheme”, Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp429-433, 1988.
    • (1988) Attack on the Koyama-Ohta Identity Based Key Distribution Scheme , pp. 429-433
    • Yacobi, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.