메뉴 건너뛰기




Volumn 1726, Issue , 1999, Pages 87-102

Efficient publicly verifiable secret sharing schemes with fast or delayed recovery

Author keywords

[No Author keywords available]

Indexed keywords

FACTORIZATION; INFORMATION THEORY; SHAREHOLDERS;

EID: 84958664495     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-47942-0_8     Document Type: Conference Paper
Times cited : (48)

References (25)
  • 2
    • 35248823311 scopus 로고    scopus 로고
    • An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms
    • F. Bao, An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms, to be published in the proceedings of CARDIS'98, 1998.
    • (1998) To Be Published in the Proceedings of CARDIS'98
    • Bao, F.1
  • 4
    • 85023982750 scopus 로고
    • An Improved Protocol for Demonstrating Possesion of Discrete Logarithm and Some Generalizations
    • D. Chaum, J.-H. Evertse and J. van de Graaf, An Improved Protocol for Demonstrating Possesion of Discrete Logarithm and Some Generalizations, Proceedings of EUROCRYPT'87, LNCS 304, pp. 127-141, 1988
    • (1988) Proceedings of EUROCRYPT'87,LNCS 304 , pp. 127
    • Chaum, D.1    Evertse, J.-H.2    Van De Graaf, J.3
  • 6
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
    • B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults, Proceedings of FOCS, pp. 383-395, 1985.
    • (1985) Proceedings of FOCS , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 9
    • 0000613666 scopus 로고
    • A Practical Scheme for Non-Interactive Verifiable Secret Sharing
    • P. Feldman, A Practical Scheme for Non-Interactive Verifiable Secret Sharing, Proceedings of the 28th IEEE Symposium on FOCS, pp. 427437, 1987.
    • (1987) Proceedings of the 28Th IEEE Symposium on FOCS , pp. 427437
    • Feldman, P.1
  • 10
    • 84957685616 scopus 로고    scopus 로고
    • A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications
    • E. Fujisaki and T. Okamoto, A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications, Proceedings of EUROCRYPT'98, LNCS 1403, pp. 32-46, 1998.
    • (1998) Proceedings of EUROCRYPT'98, LNCS 1403 , pp. 32-46
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 84990731886 scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • A. Fiat and A. Shamir, How to Prove Yourself: Practical Solutions to Identification and Signature Problems, Proceedings of CRYPTO'86, LNCS 263, pp. 186-194, 1986.
    • (1986) Proceedings of CRYPTO'86, LNCS 263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 13
    • 85028761718 scopus 로고
    • A Simple and Secure Way to Show the Validity of Your Public Key
    • J. van de Graaf and R. Peralta, A Simple and Secure Way to Show the Validity of Your Public Key, Proceedings of CRYPTO'87, LNCS 293, pp. 128-134, 1987.
    • (1987) Proceedings of CRYPTO'87, LNCS 293 , pp. 128-134
    • Van De Graaf, J.1    Peralta, R.2
  • 14
    • 0002988037 scopus 로고    scopus 로고
    • Guaranteed Correct Sharing of Integer Factorization with Offline Shareholders
    • W. Mao, Guaranteed Correct Sharing of Integer Factorization with Offline Shareholders, Proceedings of Public Key Cryptography 98, pp. 27-42, 1998.
    • (1998) Proceedings of Public Key Cryptography 98 , pp. 42
    • Mao, W.1
  • 16
    • 0017217375 scopus 로고
    • Riemann's hypothesis and Tests for Primality
    • G. Miller, Riemann's hypothesis and Tests for Primality, Journal of Computer and System Sciences (13), pp. 300-317, 1976.
    • (1976) Journal of Computer and System Sciences , vol.13 , pp. 300-317
    • Miller, G.1
  • 18
    • 84919085619 scopus 로고
    • An Improved Algorithm for Computing Logarithms over GF(P) and its Cryptographic Significance
    • S.C. Pohlig and M. Hellman, An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance, Proceedings of IEEE Transactions on Information Theory, Vol. IT-24, pp. 106-110, 1978.
    • (1978) Proceedings of IEEE Transactions on Information Theory , vol.24 , pp. 106
    • Pohlig, S.C.1    Hellman, M.2
  • 19
    • 84976113380 scopus 로고
    • Theorems on Factorization and Primality Testing
    • J.M. Pollard, Theorems on Factorization and Primality Testing, Proceedings of Cambridge Philos. Society, vol. 76, pp. 521-528, 1974
    • (1974) Proceedings of Cambridge Philos. Society , vol.76 , pp. 521-528
    • Pollard, J.M.1
  • 20
    • 84957640282 scopus 로고    scopus 로고
    • Security Analysis of a Practical "on the fly" Authentication and Signature Generation
    • G. Poupard and J. Stern, Security Analysis of a Practical "on the fly" Authentication and Signature Generation, Proceedings of EUROCRYPT 98, LNCS 1403, pp. 422-436, 1998.
    • (1998) Proceedings of EUROCRYPT 98, LNCS 1403 , pp. 422
    • Poupard, G.1    Stern, J.2
  • 22
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, How to Share a Secret, CACM, vol. 22, No. 11, pp. 612-613, 1979.
    • (1979) CACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.