메뉴 건너뛰기




Volumn 839 LNCS, Issue , 1994, Pages 61-74

Designated confirmer signatures and public-key encryption are equivalent

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84979016283     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48658-5_8     Document Type: Conference Paper
Times cited : (66)

References (27)
  • 3
    • 85043778396 scopus 로고
    • Zero-Knowledge Undeniable Signatures
    • Springer-Verlag
    • Chaum, D.: Zero-Knowledge Undeniable Signatures. Proc. of Eurocrypto’90, LNCS 473, Springer-Verlag, (1991) 458–464
    • (1991) Proc. of Eurocrypto’90, LNCS 473 , pp. 458-464
    • Chaum, D.1
  • 4
    • 0002083808 scopus 로고    scopus 로고
    • Designated Confirmer Signatures
    • Springer-Verlag (to appear)
    • Chaum, D.: Designated Confirmer Signatures. Proc. of Eurocrypt’ 94, LNCS, Springer-Verlag (to appear)
    • Proc. of Eurocrypt’ 94, LNCS
    • Chaum, D.1
  • 5
    • 0010252194 scopus 로고
    • Undeniable Signatures. Proc. of Crypto’89, LNCS 435
    • Chaum, D., van Antwerpen, H.: Undeniable Signatures. Proc. of Crypto’89, LNCS 435, Springer-Verlag, (1990) 212–216
    • (1990) Springer-Verlag , pp. 212-216
    • Chaum, D.1    Van Antwerpen, H.2
  • 7
    • 84874800178 scopus 로고
    • A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Information Theory, 31,4, (1985) 460–472
    • (1985) IEEE Trans. Information Theory , vol.31 , Issue.4 , pp. 460-472
    • Elgamal, T.1
  • 8
    • 0024135240 scopus 로고
    • Zero-Knowledge Proofs of Identity
    • Feige, U., Fiat, A., Shamir, A.: Zero-Knowledge Proofs of Identity. J. of Cryptology, 1,2 (1988) 77–94
    • (1988) J. of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 9
    • 0022793132 scopus 로고
    • How to Construct Random Functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to Construct Random Functions. J. of ACM, 33,4 (1984) 792–807
    • (1984) J. of ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 10
    • 0024868772 scopus 로고
    • A Hard-Core Predicate for any One-way Function
    • Goldreich, O., Levin, L.: A Hard-Core Predicate for any One-way Function. Proc. of STOC’89 (1989) 25–32
    • (1989) Proc. of STOC’89 , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 12
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18,1 (1989) 186–208
    • (1989) SIAM J. Comput , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 13
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput., 17,2 (1988) 281–308
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 14
    • 0022914590 scopus 로고
    • Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design. Proc. FOCS (1986) 174–187
    • (1986) Proc. FOCS , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 84959165880 scopus 로고
    • A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
    • Springer-Verlag
    • Guillou, L. C., Quisquater, J.J.: A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. Proc. of Eurocrypt’88, LNCS 330, Springer-Verlag (1988) 123–128
    • (1988) Proc. of Eurocrypt’88, LNCS 330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.J.2
  • 16
    • 0025115363 scopus 로고
    • Pseudo-Random Generators under Uniform Assumptions
    • Håstad, J.: Pseudo-Random Generators under Uniform Assumptions. Proc. of STOC (1990) 395–404
    • (1990) Proc. of STOC , pp. 395-404
    • Håstad, J.1
  • 17
    • 0024866111 scopus 로고
    • Pseudo-Random Number Generation from One-Way Functions
    • Impagliazzo, R., Levin, L., Luby, L.: Pseudo-Random Number Generation from One-Way Functions. Proc. of STOC (1989) 12–24
    • (1989) Proc. of STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.2    Luby, L.3
  • 18
    • 0024866742 scopus 로고
    • Limits on the Provable Consequence of One-Way Permutations
    • Impagliazzo, R., Rudich, S.: Limits on the Provable Consequence of One-Way Permutations. Proc. of STOC (1989) 44–61
    • (1989) Proc. of STOC , pp. 44-61
    • Impagliazzo, R.1    Rudich, S.2
  • 19
  • 20
    • 0023985474 scopus 로고
    • The Notion of Security of Probabilistic Cryptosystems
    • Micali, S., Rackoff, C., Sloan, B.: The Notion of Security of Probabilistic Cryptosystems. SIAM J. Comput., 17,2 (1988) 412–426
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, B.3
  • 21
    • 79551478054 scopus 로고
    • Bit Commitment Using Pseudo-Randomness
    • Springer-Verlag
    • Naor, M.: Bit Commitment Using Pseudo-Randomness. Proc. of Crypto’89, LNCS 435, Springer-Verlag, (1990) 128–136
    • (1990) Proc. of Crypto’89, LNCS 435 , pp. 128-136
    • Naor, M.1
  • 22
    • 0024867751 scopus 로고
    • Universal One-Way Hash Functions and Their Cryptographic Applications
    • Naor, M., Yung, M.: Universal One-Way Hash Functions and Their Cryptographic Applications. Proc. of STOC (1989) 33–43
    • (1989) Proc. of STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 23
    • 85031804925 scopus 로고
    • A Modification of the Fiat-Shamir Scheme
    • Springer-Verlag
    • Ohta, K., Okamoto, T.: A Modification of the Fiat-Shamir Scheme. Proc. of Crypto’88, LNCS 403, Springer-Verlag (1990) 232–243
    • (1990) Proc. of Crypto’88, LNCS 403 , pp. 232-243
    • Ohta, K.1    Okamoto, T.2
  • 24
    • 84875762817 scopus 로고
    • Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
    • Springer-Verlag
    • Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. Proc. of Crypto’92, LNCS 740, Springer-Verlag, (1993) 31–53
    • (1993) Proc. of Crypto’92, LNCS 740 , pp. 31-53
    • Okamoto, T.1
  • 25
    • 85028776188 scopus 로고
    • On the Relationship among Cryptographic Physical Assumptions
    • Springer-Verlag
    • Okamoto, T.: On the Relationship among Cryptographic Physical Assumptions. Proc. of ISAAC’93, LNCS 762, Springer-Verlag, (1993) 369–378
    • (1993) Proc. of ISAAC’93, LNCS 762 , pp. 369-378
    • Okamoto, T.1
  • 26
    • 0025152622 scopus 로고
    • One-Way Functions are Necessary and Sufficient for Secure Signature
    • Rompel, J.: One-Way Functions are Necessary and Sufficient for Secure Signature. Proc. of STOC (1990) 387–394
    • (1990) Proc. of STOC , pp. 387-394
    • Rompel, J.1
  • 27
    • 12344258539 scopus 로고
    • Efficient Signature Generation by Smart Cards
    • Schnorr, C. P.: Efficient Signature Generation by Smart Cards. J. of Cryptology, 4,3 (1991) 161–174
    • (1991) J. of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.