메뉴 건너뛰기




Volumn 1431, Issue , 1998, Pages 60-71

Guaranteed correct sharing of integer factorization with Off-line shareholders

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; FACTORIZATION; SHAREHOLDERS;

EID: 84958986003     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0054015     Document Type: Conference Paper
Times cited : (31)

References (24)
  • 2
    • 0003030602 scopus 로고
    • Coin flipping by telephone: A protocol for solving impossible problems
    • M. Blum. Coin flipping by telephone: a protocol for solving impossible problems. In Proceedings of 24th IEEE Computer Conference (CompCon), pages 133-137. 1982.
    • (1982) Proceedings of 24Th IEEE Computer Conference (Compcon) , pp. 133-137
    • Blum, M.1
  • 7
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469-472, July 1985.
    • (1985) IEEE Transactions on Information Theory, IT , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 8
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solution to identification and signature problems
    • Springer-Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solution to identification and signature problems. In Advances in Cryptology - Proceedings of CRYPTO'86 (LNCS 263), pages 186-194. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology - Proceedings of CRYPTO'86 (LNCS 263) , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 18
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Springer-Verlag
    • T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology - Proceedings of CRYPTO'91 (LNCS 576), pages 129-140. Springer-Verlag, 1992.
    • (1992) Advances in Cryptology - Proceedings of CRYPTO'91 (LNCS 576) , pp. 129-140
    • Pedersen, T.1
  • 19
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Springer-Verlag
    • L.C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In Advances in Cryptology - Proceedings of EUROCRYPT'88 (LNCS 330), pages 123-128. Springer-Verlag, 1988.
    • (1988) Advances in Cryptology - Proceedings of EUROCRYPT'88 (LNCS 330) , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM v.21, n.2, 1978, pages 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM 22, 1979, pages 612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 23
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • CP. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.