메뉴 건너뛰기




Volumn 2274, Issue , 2002, Pages 64-79

Efficient and unconditionally secure digital signatures and a security analysis of a multireceiver authentication code

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTATION THEORY; CRYPTOGRAPHY; DIGITAL STORAGE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84958954335     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45664-3_5     Document Type: Conference Paper
Times cited : (9)

References (19)
  • 5
    • 85027188625 scopus 로고
    • Arbitrated unconditionally secure authentication can be unconditionally protected against arbiters attack,”
    • Y. Desmedt and M. Yung, “Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attack,” Proc. of CRYPTO’90, LNCS 537, Springer-Verlag, pp.177-188, 1990.
    • (1990) Proc. Of CRYPTO’90, LNCS 537, Springer-Verlag , pp. 177-188
    • Desmedt, Y.1    Yung, M.2
  • 6
    • 0026992399 scopus 로고
    • Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
    • Y. Desmedt, Y. Frankel and M. Yung, “Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback,” Proc. of IEEE Infocom’92, pp.2045-2054, 1992.
    • (1992) Proc. Of IEEE Infocom’92 , pp. 2045-2054
    • Desmedt, Y.1    Frankel, Y.2    Yung, M.3
  • 8
    • 0001925043 scopus 로고    scopus 로고
    • Further results on asymmetric authentication schemes
    • T. Johansson, “Further results on asymmetric authentication schemes,” Information and Computation, 151, pp.100-133, 1999.
    • (1999) Information and Computation , vol.151 , pp. 100-133
    • Johansson, T.1
  • 12
    • 0008284565 scopus 로고    scopus 로고
    • Fail-stop signatures
    • T. P. Pedersen and B. Pfitzmann, “Fail-stop signatures,” SIAM J. on Comp., 26, no.2, pp.291-330, 1997.
    • (1997) SIAM J. On Comp , vol.26 , Issue.2 , pp. 291-330
    • Pedersen, T.P.1    Pfitzmann, B.2
  • 13
    • 84957715332 scopus 로고    scopus 로고
    • New results on multi-receiver authentication codes
    • R. Safavi-Naini and H. Wang, “New results on multi-receiver authentication codes,” Proc. of Eurocrypt’98, LNCS 1403, pp.527-541, 1998.
    • (1998) Proc. Of Eurocrypt’98, LNCS , vol.1403 , pp. 527-541
    • Safavi-Naini, R.1    Wang, H.2
  • 15
    • 0001531989 scopus 로고    scopus 로고
    • Multireceiver authentication codes: Models, bounds, constructions and extensions
    • R. Safavi-Naini and H. Wang, “Multireceiver authentication codes: models, bounds, constructions and extensions,” Information and Computation, 151, pp.148-172, 1999.
    • (1999) Information and Computation , vol.151 , pp. 148-172
    • Safavi-Naini, R.1    Wang, H.2
  • 16
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM J. Comp., 26, no.5, pp.1484-1509, 1997.
    • (1997) SIAM J. Comp , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 18
    • 84920719029 scopus 로고
    • Message authentication with arbitration of transmitter/receiver disputes
    • G. J. Simmons, “Message authentication with arbitration of transmitter/receiver disputes,” Proc. of Eurocrypt’87, Springer-Verlag, pp.151-165, 1987.
    • (1987) Proc. Of Eurocrypt’87, Springer-Verlag , pp. 151-165
    • Simmons, G.J.1
  • 19
    • 0025157340 scopus 로고
    • A Cartesian construction for unconditionally secure authentication codes that permit arbitration
    • G. J. Simmons, “A Cartesian construction for unconditionally secure authentication codes that permit arbitration,” Journal of Cryptology, 2, pp.77-104, 1990.
    • (1990) Journal of Cryptology , vol.2 , pp. 77-104
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.