메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 147-165

Quantum public-key cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); PUBLIC KEY CRYPTOGRAPHY;

EID: 84983157038     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_9     Document Type: Conference Paper
Times cited : (116)

References (39)
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • 22-26 Aug, D. R. Stinson, Ed, of Lecture Notes in Computer Science, Springer-Verlag
    • Bellare, M., and Rogaway, P. Entity authentication and key distribution. In Advances in Cryptology-CRYPTO ’93 (22-26 Aug. 1993), D. R. Stinson, Ed., vol. 773 of Lecture Notes in Computer Science, Springer-Verlag, pp. 232-249.
    • (1993) Advances in Cryptology-Crypto ’93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0001063035 scopus 로고    scopus 로고
    • Strengths and weaknesses of quantum computing
    • Oct
    • Bennett, C. H., Bernstein, E., Brassard, G., and Vazirani, U. Strengths and weaknesses of quantum computing. SIAM J. Comput. 26, 5 (Oct. 1997), 1510-1523.
    • (1997) SIAM J. Comput , vol.26 , Issue.5 , pp. 1510-1523
    • Bennett, C.H.1    Bernstein, E.2    Brassard, G.3    Vazirani, U.4
  • 7
    • 85032431591 scopus 로고
    • An update on quantum cryptography
    • 19-22 Aug. 1984G. R. Blakley and D. Chaum, Eds, of Lecture Notes in Computer Science, Springer-Verlag
    • Bennett, C. H., and Brassard, G. An update on quantum cryptography. In Advances in Cryptology: Proceedings of CRYPTO 84 (19-22 Aug. 1984), G. R. Blakley and D. Chaum, Eds., vol. 196 of Lecture Notes in Computer Science, Springer-Verlag, 1985, pp. 475-480.
    • (1985) Advances in Cryptology: Proceedings of CRYPTO 84 , vol.196 , pp. 475-480
    • Bennett, C.H.1    Brassard, G.2
  • 10
    • 11944263767 scopus 로고
    • Quantum cryptography without Bell’s theorem
    • Bennett, C. H., Brassard, G., and Mermin, N. D. Quantum cryptography without Bell’s theorem. Physical Review Letters 68, 5 (Feb. 1992), 557-559.
    • (1992) Physical Review Letters , vol.68 , Issue.5 , pp. 557-559
    • Bennett, C.H.1    Brassard, G.2    Mermin, N.D.3
  • 12
    • 85007343167 scopus 로고
    • Quantum bit commitment and coin tossing protocols
    • 11-15 Aug. 1990A. J. Menezes and S. A. Vanstone, Eds, of Lecture Notes in Computer Science, Springer-Verlag
    • Brassard, G., and Crépeau, C. Quantum bit commitment and coin tossing protocols. In Advances in Cryptology-CRYPTO ’90 (11-15 Aug. 1990), A. J. Menezes and S. A. Vanstone, Eds., vol. 537 of Lecture Notes in Computer Science, Springer-Verlag, 1991, pp. 49-61.
    • (1991) Advances in Cryptology-Crypto ’90 , vol.537 , pp. 49-61
    • Brassard, G.1    Crépeau, C.2
  • 13
    • 0024079003 scopus 로고
    • A knapsack-type public key cryptosystem based on arithmetic in finite fields
    • Chor, B., and Rivest, R. L. A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Trans. on Information Theory 34 (1988), 901-909.
    • (1988) IEEE Trans. on Information Theory , vol.34 , pp. 901-909
    • Chor, B.1    Rivest, R.L.2
  • 16
    • 84957700505 scopus 로고    scopus 로고
    • Quantum oblivious mutual identification
    • Crépeau, C., and Salvail, L. Quantum oblivious mutual identification. In Guillou and Quisquater [26], pp. 133-146.
    • Guillou and Quisquater , Issue.26 , pp. 133-146
    • Crépeau, C.1    Salvail, L.2
  • 17
    • 0000119236 scopus 로고
    • Rapid solution of problems by quantum computation
    • Deutsch, D., and Jozsa, R. Rapid solution of problems by quantum computation. Proc. R. Soc. Lond. A 439 (1992), 553-558.
    • (1992) Proc. R. Soc. Lond. A , vol.439 , pp. 553-558
    • Deutsch, D.1    Jozsa, R.2
  • 19
    • 84948989963 scopus 로고    scopus 로고
    • Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
    • Dumais, P., Mayers, D., and Savail, L. Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation. In Advances in Cryptology-EUROCRYPT2000 (2000), pp. 300-315.
    • (2000) In Advances in Cryptology-Eurocrypt2000 , pp. 300-315
    • Dumais, P.1    Mayers, D.2    Savail, L.3
  • 20
    • 84956859011 scopus 로고    scopus 로고
    • How to Enhance the Security of Public-Key Encryption at Minimum Cost
    • Fujisaki, E. and Okamoto, T. How to Enhance the Security of Public-Key Encryption at Minimum Cost. In PKC’99 (1999), pp. 53-68.
    • (1999) In PKC’99 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 21
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • Fujisaki, E. and Okamoto, T. Secure Integration of Asymmetric and Symmetric Encryption Schemes. In Advances in Cryptology-CRYPTO’99 (1999), pp. 537-554.
    • (1999) In Advances in Cryptology-CRYPTO’99 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 22
    • 84926399824 scopus 로고    scopus 로고
    • On the foundations of modern cryptography
    • 17-21 Aug., B. S. Kaliski Jr., Ed, of Lecture Notes in Computer Science, Springer-Verlag
    • Goldreich, O. On the foundations of modern cryptography. In Advances in Cryptology-CRYPTO ’97 (17-21 Aug. 1997), B. S. Kaliski Jr., Ed., vol. 1294 of Lecture Notes in Computer Science, Springer-Verlag, pp. 46-74.
    • (1997) Advances in Cryptology-Crypto ’97 , vol.1294 , pp. 46-74
    • Goldreich, O.1
  • 24
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Apr
    • Goldwasser, S., Micali, S., and Rivest, R. L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2 (Apr. 1988), 281-308.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 29
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels
    • 18-22 Aug, N. Koblitz, Ed, of Lecture Notes in Computer Science, Springer-Verlag
    • Mayers, D. Quantum key distribution and string oblivious transfer in noisy channels. In Advances in Cryptology-CRYPTO ’96 (18-22 Aug. 1996), N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp. 343-357.
    • (1996) Advances in Cryptology-Crypto ’96 , vol.1109 , pp. 343-357
    • Mayers, D.1
  • 30
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • Merkle, R. C., and Hellman, M. E. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Information Theory 24 (1978), 525-530.
    • (1978) IEEE Trans. on Information Theory , vol.24 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.E.2
  • 33
    • 0021466998 scopus 로고
    • Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme
    • Odlyzko, A. M. Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme. IEEE Trans. on Information Theory IT-30 (1984), 594-601.
    • (1984) IEEE Trans. on Information Theory IT-30 , pp. 594-601
    • Odlyzko, A.M.1
  • 35
    • 0012619683 scopus 로고
    • A Multiple-Iterated Trapdoor for Dense Compact Knapsacks
    • Orton, G. A Multiple-Iterated Trapdoor for Dense Compact Knapsacks. In Advances in Cryptology-EUROCRYPT’94 (1994), pp. 112-130.
    • (1994) In Advances in Cryptology-EUROCRYPT’94 , pp. 112-130
    • Orton, G.1
  • 36
    • 0009452048 scopus 로고    scopus 로고
    • Attacking the Chor-Rivest cryptosystem by improved lattice reduction
    • Schnorr, C. P., and Hörner, H. H. Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Guillou and Quisquater [26], pp. 1-12.
    • Guillou and Quisquater , Issue.26 , pp. 1-12
    • Schnorr, C.P.1    Hörner, H.H.2
  • 37
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Oct
    • Shor, P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 5 (Oct. 1997), 1484-1509.
    • (1997) SIAM J. Comput , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 38
    • 0009438294 scopus 로고    scopus 로고
    • On the power of quantum computation
    • Oct
    • Simon, D. R. On the power of quantum computation. SIAM J. Comput. 26, 5 (Oct. 1997), 1474-1483.
    • (1997) SIAM J. Comput , vol.26 , Issue.5 , pp. 1474-1483
    • Simon, D.R.1
  • 39


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.