메뉴 건너뛰기




Volumn 2501, Issue , 2002, Pages 397-414

Transitive signatures based on factoring and rsa

Author keywords

RSA; Signatures; Transitive signatures

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84958775356     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36178-2_25     Document Type: Conference Paper
Times cited : (52)

References (16)
  • 1
    • 84937427768 scopus 로고    scopus 로고
    • A new forward-secure digital signature scheme
    • Lecture Notes in Computer Science, T. Okamoto ed., Springer-Verlag
    • M. Abdalla and L. Reyzin. A new forward-secure digital signature scheme. Advances in Cryptology – ASIACRYPT’00, Lecture Notes in Computer Science Vol. 1976, T. Okamoto ed., Springer-Verlag, 2000.
    • (2000) Advances in Cryptology – ASIACRYPT’00 , vol.1976
    • Abdalla, M.1    Reyzin, L.2
  • 2
    • 35248869043 scopus 로고    scopus 로고
    • The One-More-RSA-Inversion problems and the security of Chaum’s blind signature scheme
    • Cryptology ePrint Archive: Report 2001/002, Preliminary version, entitled “The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme, Lecture Notes in Computer Science, P. Syverson ed., Springer-Verlag
    • M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko. The One-More-RSA-Inversion problems and the security of Chaum’s blind signature scheme. Cryptology ePrint Archive: Report 2001/002, http://eprint.iacr.org/2001/002/. Preliminary version, entitled “The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme,” in Financial Cryptography’01, Lecture Notes in Computer Science Vol. 2339, P. Syverson ed., Springer-Verlag, 2001.
    • (2001) Financial Cryptography’01 , vol.2339
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 4
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
    • Lecture Notes in Computer Science, M. Yung ed., Springer-Verlag
    • M. Bellare and A. Palacio. GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Advances in Cryptology – CRYPTO’02, Lecture Notes in Computer Science Vol. 2442, M. Yung ed., Springer-Verlag, 2002.
    • (2002) Advances in Cryptology – CRYPTO’02 , vol.2442
    • Bellare, M.1    Palacio, A.2
  • 7
    • 0001604533 scopus 로고    scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, R. Rivest and A. Sherman eds., Plenum Press
    • D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology – CRYTPO 82Pro ceedings, D. Chaum, R. Rivest and A. Sherman eds., Plenum Press.
    • Advances in Cryptology – CRYTPO 82Pro Ceedings
    • Chaum, D.1
  • 8
  • 9
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, Vol. 17, No. 2, April 1988, pp. 281–308.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 10
    • 0345270373 scopus 로고
    • A “paradoxical” identity-based signature scheme resulting from zero-knowledge
    • Lecture Notes in Computer Science, S. Goldwasser ed., Springer-Verlag
    • L. Guillou and J. J. Quisquater. A “paradoxical” identity-based signature scheme resulting from zero-knowledge. Advances in Cryptology – CRYPTO’88, Lecture Notes in Computer Science Vol. 403, S. Goldwasser ed., Springer-Verlag, 1988.
    • (1988) Advances in Cryptology – CRYPTO’88 , vol.403
    • Guillou, L.1    Quisquater, J.J.2
  • 11
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • Lecture Notes in Computer Science, B. Preneel ed., Springer-Verlag
    • R. Johnson, D. Molnar, D. Song and D. Wagner. Homomorphic signature schemes. Topics in Cryptology – CT-RSA’02, Lecture Notes in Computer Science Vol. 2271, B. Preneel ed., Springer-Verlag, 2002.
    • (2002) Topics in Cryptology – CT-RSA’02 , vol.2271
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 12
    • 84944878224 scopus 로고    scopus 로고
    • Transitive signature schemes
    • Lecture Notes in Computer Science, B. Preneel ed., Springer-Verlag
    • S. Micali and R. Rivest. Transitive signature schemes. Topics in Cryptology – CT-RSA’02, Lecture Notes in Computer Science Vol. 2271, B. Preneel ed., Springer-Verlag, 2002.
    • (2002) Topics in Cryptology – CT-RSA’02 , vol.2271
    • Micali, S.1    Rivest, R.2
  • 13
    • 0344839013 scopus 로고    scopus 로고
    • Improving the exact security of digital signature schemes
    • S. Micali and L. Reyzin. Improving the exact security of digital signature schemes. Journal of Cryptology, Vol. 15, Number 1, 2002, pp. 1–18.
    • (2002) Journal of Cryptology , vol.15 , Issue.1 , pp. 1-18
    • Micali, S.1    Reyzin, L.2
  • 14
    • 33646041848 scopus 로고    scopus 로고
    • Slides from talk given at Cambridge University, October 17
    • R. Rivest. Two signature schemes. Slides from talk given at Cambridge University, October 17, 2000.
    • (2000) Two Signature Schemes
    • Rivest, R.1
  • 15
    • 84969362298 scopus 로고    scopus 로고
    • http://theory.lcs.mit.edu/˜rivest/publications.html.
  • 16
    • 84949982830 scopus 로고    scopus 로고
    • Content Extraction Signatures
    • Lecture Notes in Computer Science, K. Kim ed., Springer-Verlag
    • R. Steinfeld, L. Bull and Y. Zheng. Content Extraction Signatures. Information Security and Cryptology – ICISC 2001, Lecture Notes in Computer Science Vol. 2288, K. Kim ed., Springer-Verlag, 2002.
    • (2002) Information Security and Cryptology – ICISC 2001 , vol.2288
    • Steinfeld, R.1    Bull, L.2    Zheng, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.