메뉴 건너뛰기




Volumn 1787, Issue , 2000, Pages 197-207

On threshold RSA-signing with no dealer

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84958759867     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10719994_16     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 84956860375 scopus 로고    scopus 로고
    • Experimenting with electronic commerce on the PalmPilot
    • Springer-Verlag
    • D. Boneh and N. Daswani. “Experimenting with electronic commerce on the PalmPilot”, Proc. of Financial Cryptography‘99, LNCS, Vol. 1648, Springer-Verlag, pp. 1-16, 1999.
    • (1999) Proc. Of Financial Cryptography‘99, LNCS , vol.1648 , pp. 1-16
    • Boneh, D.1    Daswani, N.2
  • 4
    • 84985822377 scopus 로고    scopus 로고
    • Threshold cryptosystems
    • Y. Desmedt. “Threshold cryptosystems” (a survey). In Auscrypt’92, LNCS 718, pages 3-14.
    • Auscrypt’92, LNCS , vol.718 , pp. 3-14
    • Desmedt, Y.1
  • 5
    • 85022187530 scopus 로고    scopus 로고
    • Shared generation of authenticators and signatures (Extended abstract)
    • Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures (extended abstract). In CRYPTO’91 CRYPTO91, pages 457-469.
    • CRYPTO’91 CRYPTO91 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 8
    • 0029713931 scopus 로고    scopus 로고
    • Witness-based cryptographic program checking and robust function sharing
    • Y. Frankel, P. Gemmell, and M. Yung. Witness-based cryptographic program checking and robust function sharing. In STOC’96, pages 499-508.
    • STOC’96 , pp. 499-508
    • Frankel, Y.1    Gemmell, P.2    Yung, M.3
  • 11
    • 22044454382 scopus 로고    scopus 로고
    • Distributed public key cryptosystems
    • Y. Frankel and M. Yung, “Distributed public key cryptosystems”, (Invited Paper) Public Key Cryptography, LNCS 1431, pp. 1-13, 1998.
    • (1998) Public Key Cryptography, LNCS , vol.1431 , pp. 1-13
    • Frankel, Y.1    Yung, M.2
  • 14
    • 52049125368 scopus 로고    scopus 로고
    • Threshold key-recovery systems for RSA
    • T. Okamoto, “Threshold key-recovery systems for RSA”, Security Protocols, LNCS 1361, pp. 191-200, 1997.
    • (1997) Security Protocols, LNCS , vol.1361 , pp. 191-200
    • Okamoto, T.1
  • 15
    • 84876222959 scopus 로고
    • Distributed provers with applications to undeniable signatures
    • T. P. Pedersen, “Distributed provers with applications to undeniable signatures”, Advances in Cryptology-Eurocrypt‘91, LNCS 547, pp. 221-238, 1991.
    • (1991) Advances in Cryptology-Eurocrypt‘91, LNCS , vol.547 , pp. 221-238
    • Pedersen, T.P.1
  • 16
  • 17
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive rsa
    • T. Rabin. A simplified approach to threshold and proactive rsa. In Krawczyk CRYPTO98, pages 89-104.
    • Krawczyk CRYPTO98 , pp. 89-104
    • Rabin, T.1
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, “How to share a secret”, Communication ACM, 22, pp. 612-613, 1979.
    • (1979) Communication ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 19
    • 0001000209 scopus 로고    scopus 로고
    • June 24, A revision of IBM Research Report RZ 3121 (April 19, 1999) available from Theory of Cryptography Library 99-11
    • V. Shoup, “Practical threshold signatures”, June 24, 1999, A revision of IBM Research Report RZ 3121 (April 19, 1999) available from Theory of Cryptography Library 99-11, http://philby.ucsd.edu/cryptolib/1999.html.
    • (1999) Practical Threshold Signatures
    • Shoup, V.1
  • 20
    • 0343349510 scopus 로고
    • A’weak’ privacy protocol using the RSA cryptoalgorithm
    • G. J. Simmons, “A’weak’ privacy protocol using the RSA cryptoalgorithm”, Cryptologia, vol. 7, pp. 180-182, 1983.
    • (1983) Cryptologia , vol.7 , pp. 180-182
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.