메뉴 건너뛰기




Volumn 547 LNCS, Issue , 1991, Pages 205-220

Weaknesses of undeniable signature schemes

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY;

EID: 84958770476     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46416-6_19     Document Type: Conference Paper
Times cited : (49)

References (23)
  • 1
    • 0003030602 scopus 로고
    • Coin flipping by telephone — a protocol for solving impossible problems
    • IEEE Computer Society, February
    • M. Blum. Coin flipping by telephone — a protocol for solving impossible problems. In digest of papers COMPCON82, pp. 133-137. IEEE Computer Society, February 1982.
    • (1982) Digest of Papers COMPCON82 , pp. 133-137
    • Blum, M.1
  • 2
    • 0012494996 scopus 로고
    • Convertible undeniable signatures
    • August 12-15, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto '90 (Lecture Notes in Computer Science), Springer-Verlag, 1990
    • J. Boyar, D. Chaum, I. Damgard, and T. Pedersen. Convertible undeniable signatures. Presented at Crypto ’90, August 12-15, 1990, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto '90 (Lecture Notes in Computer Science), Springer-Verlag, 1990.
    • (1990) Presented at Crypto ’90
    • Boyar, J.1    Chaum, D.2    Damgard, I.3    Pedersen, T.4
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24 (2), pp. 84-88, February 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 4
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1 (1), pp. 65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 5
    • 85030451201 scopus 로고
    • On weaknesses of ‘weaknesses of undeniable signatures'
    • Brighton, U.K., April (Communicated to us by Gus Simmons.)
    • D. Chaum. On weaknesses of ‘weaknesses of undeniable signatures'. Presented at the rump session of Eurocrypt ’91, Brighton, U.K., April (Communicated to us by Gus Simmons.) 1991.
    • (1991) Presented at the Rump Session of Eurocrypt ’91
    • Chaum, D.1
  • 9
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party’s input and correctness of the result
    • In C. Pomerance, editor, Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20
    • D. Chaum, I. Damgard, and J. van de Graaf. Multiparty computations ensuring privacy of each party’s input and correctness of the result. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293), pp. 87-119. Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20, 1987.
    • (1987) Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293) , pp. 87-119
    • Chaum, D.1    Damgard, I.2    Van De Graaf, J.3
  • 11
    • 0010276082 scopus 로고
    • Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem
    • University of Wisconsin-Milwaukee, October
    • G. I. Davida. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Tech. Report TR-CS-82-2, University of Wisconsin-Milwaukee, October 1982.
    • (1982) Tech. Report TR-CS-82-2
    • Davida, G.I.1
  • 13
    • 85012584879 scopus 로고
    • Some variations on RSA signatures & their security
    • In A. Odlyzko, editor, Springer-Verlag, Santa Barbara, California, U. S. A., August 11-15
    • W. de Jonge and D. Chaum. Some variations on RSA signatures & their security. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto’86 (Lecture Notes in Computer Science 263), pp. 49-59. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11-15.
    • (1987) Advances in Cryptology, Proc. of Crypto’86 (Lecture Notes in Computer Science 263) , pp. 49-59
    • De Jonge, W.1    Chaum, D.2
  • 15
    • 84976740532 scopus 로고
    • Digital signatures with RSA and other public-key cryptosystems
    • D. E. R. Denning. Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27, pp. 388-392, 1984.
    • (1984) Comm. ACM , vol.27 , pp. 388-392
    • Denning, D.E.R.1
  • 16
    • 85028745474 scopus 로고
    • Special uses and abuses of the Fiat-Shamir passport protocol
    • In C. Pomerance, editor, Springer-Verlag, Santa Barbara, California, U.S.A., August 16-20
    • Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293), pp. 21-39. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16-20.
    • (1988) Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293) , pp. 21-39
    • Desmedt, Y.1    Goutier, C.2    Bengio, S.3
  • 17
    • 85030458019 scopus 로고    scopus 로고
    • A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
    • In Hugh C. Williams, editor, Springer-Verlag, Santa Barbara, California, U.S.A., August 18-20
    • Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. In Hugh C. Williams, editor, Advances in Cryptology: Crypto’85, Proceedings (Lecture Notes in Computer Science 218), pp. 516-522. Springer-Verlag, 1986. Santa Barbara, California, U.S.A., August 18-20.
    • Advances in Cryptology: Crypto’85, Proceedings (Lecture Notes in Computer Science 218)
    • Desmedt, Y.1    Odlyzko, A.2
  • 18
    • 0020720357 scopus 로고
    • On the security of public key cryptography
    • March
    • O. Dolev and A. Yao. On the security of public key cryptography. IEEE Trans. Inform. Theory, 29, pp. 198-208, March 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , pp. 198-208
    • Dolev, O.1    Yao, A.2
  • 19
    • 84976655650 scopus 로고
    • Cryptographic computations: Secure fault-tolerant protocols and the public-key model
    • In C. Pomerance, editor, Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20
    • Z. Galil, S. Haber, and M. Yung. Cryptographic computations: secure fault-tolerant protocols and the public-key model In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293), pp. 135-155. Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20, 1987.
    • (1987) Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 22
    • 0024014116 scopus 로고
    • Protocol failures in cryptosystems
    • May
    • J. H. Moore. Protocol failures in cryptosystems. Proc. IEEE, 76(5), pp. 594-602, May 1988.
    • (1988) Proc. IEEE , vol.76 , Issue.5 , pp. 594-602
    • Moore, J.H.1
  • 23
    • 85032864442 scopus 로고
    • Divertible zero knowledge interactive proofs and commutative random self-reducibility
    • In J.-J. Quisquater and J. Vande-walle, editors, Springer-Verlag, Houthalen, Belgium, April 10-13
    • T. Okamoto and K. Ohta. Divertible zero knowledge interactive proofs and commutative random self-reducibility. In J.-J. Quisquater and J. Vande-walle, editors, Advances in Cryptology, Proc. of Eurocrypt’89 (Lecture Notes in Computer Science 434), PP. 134-149. Springer-Verlag, 1990. Houthalen, Belgium, April 10-13.
    • (1990) Advances in Cryptology, Proc. of Eurocrypt’89 (Lecture Notes in Computer Science 434) , pp. 134-149
    • Okamoto, T.1    Ohta, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.