메뉴 건너뛰기




Volumn 434 LNCS, Issue , 1990, Pages 29-37

An identity-based key-exchange protocol

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 84969368443     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BF02828658     Document Type: Conference Paper
Times cited : (206)

References (12)
  • 2
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. El-Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans, on Inform. Theory, vol. IT-31, pp. 469-472, July 1985.
    • (1985) IEEE Trans, on Inform. Theory , vol.31 , pp. 469-472
    • El-Gamal, T.1
  • 3
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,”
    • R. L. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120-126, Feb. 1978.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 5
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems,”
    • S. Goldwasser, S. Micali, C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems,” SIAM J. Comput., vol. 18, pp. 186-208, Feb. 1989.
    • (1989) SIAM J. Comput. , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 6
    • 0024135240 scopus 로고
    • Zero-Knowledge Proofs of Identity
    • U. Feige, A. Fiat, A. Shamir, “Zero-Knowledge Proofs of Identity,” J. of Cryptology, vol. 1, pp. 77-94, 1988.
    • (1988) J. of Cryptology , vol.1 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 7
    • 84990731886 scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • Springer-Verlag
    • A. Fiat, A. Shamir, “How to Prove Yourself: Practical Solutions to Identification and Signature Problems,” Advances in Cryptology - CRYPTO’86. Lect. Notes in Computer Science, vol. 263, pp. 186-194, Springer-Verlag (1987).
    • (1987) Advances in Cryptology - CRYPTO’86. Lect. Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 9
    • 84959165880 scopus 로고
    • A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
    • Springer-Verlag
    • L. C. Guillou, J. -J. Quisquater, “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory,” Advances in Cryptology - EUROCRYPT’88, Lect. Notes in Computer Science, vol. 330, pp. 123-128, Springer-Verlag (1988).
    • (1988) Advances in Cryptology - EUROCRYPT’88, Lect. Notes in Computer Science , vol.330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 12
    • 0024665726 scopus 로고
    • Key Distribution System Based on Identification Information
    • E. Okamoto, K. Tanaka, “Key Distribution System Based on Identification Information,” IEEE J. Select. Areas Commun., vol. SAC-7, pp. 481-485, May 1989.
    • (1989) IEEE J. Select. Areas Commun. , vol.7 , pp. 481-485
    • Okamoto, E.1    Tanaka, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.