메뉴 건너뛰기




Volumn 537 LNCS, Issue , 1991, Pages 177-188

Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attacks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 85027188625     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-38424-3_13     Document Type: Conference Paper
Times cited : (29)

References (19)
  • 3
    • 85012584879 scopus 로고
    • Some variations on RSA signatures & their security
    • A. Odlyzko, editor, Springer-Verlag, Santa Barbara, California, U. S. A., August 11-15
    • W. de Jonge and D. Chaum. Some variations on RSA signatures & their security. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto '86 (Lecture Notes in Computer Science 263), pp. 49-59. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11-15.
    • (1987) Advances in Cryptology, Proc. of Crypto '86 (Lecture Notes in Computer Science 263) , pp. 49-59
    • de Jonge, W.1    Chaum, D.2
  • 4
    • 84976740532 scopus 로고
    • Digital signatures with RSA and other public-key cryptosystems
    • D. E. R. Denning. Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27, pp. 388-392, 1984.
    • (1984) Comm. ACM 27 , pp. 388-392
    • Denning, D.E.R.1
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. E. Heilman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6), pp. 644-654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Heilman, M.E.2
  • 8
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2), pp. 281-308, April 1988.
    • (1988) Siam J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 9
    • 0024770898 scopus 로고
    • One-way functions are essential for complexity based cryptography
    • IEEE Computer Society Press, October 30-November 1, Research Triangle Park, NC, U. S.A
    • R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In 30th Annual Symp. on Foundations of Computer Science (FOCS), pp. 230-235. IEEE Computer Society Press, October 30-November 1, 1988. Research Triangle Park, NC, U. S.A.
    • (1988) 30th Annual Symp. on Foundations of Computer Science (FOCS) , pp. 230-235
    • Impagliazzo, R.1    Luby, M.2
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • April
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21, pp. 294-299, April 1978.
    • (1978) Commun. ACM , vol.21 , pp. 294-299
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 84920719029 scopus 로고
    • Message authentication with arbitration of transmitter/receiver disputes
    • D. Chaum and W. L. Price, editors, PP-151-165. Springer-Verlag, Berlin, 1988. Amsterdam, The Netherlands, April 13-15, full paper submitted to the Journal of Cryptology
    • G. J. Simmons. Message authentication with arbitration of transmitter/receiver disputes. In D. Chaum and W. L. Price, editors, Advances in Cryptology-Eurocrypt '87 (Lecture Notes in Computer Science 304), PP-151-165. Springer-Verlag, Berlin, 1988. Amsterdam, The Netherlands, April 13-15, 1987, full paper submitted to the Journal of Cryptology.
    • (1987) Advances in Cryptology-Eurocrypt '87 (Lecture Notes in Computer Science 304)
    • Simmons, G.J.1
  • 16
    • 0024015453 scopus 로고
    • A survey of information authentication
    • May
    • G. J. Simmons. A survey of information authentication. Proc. IEEE, 76(5), pp. 603-620, May 1988.
    • (1988) Proc. IEEE , vol.76 , Issue.5 , pp. 603-620
    • Simmons, G.J.1
  • 17
    • 33745715684 scopus 로고
    • Robust shared secret schemes
    • G. J. Simmons. Robust shared secret schemes. Congressus Numerantium, 68, pp. 215-248, 1989.
    • (1989) Congressus Numerantium , vol.68 , pp. 215-248
    • Simmons, G.J.1
  • 18
    • 0025157340 scopus 로고
    • A Cartesian product construction for unconditionally secure authentication codes that permit arbitration
    • G. J. Simmons. A Cartesian product construction for unconditionally secure authentication codes that permit arbitration. Journal of Cryptology, 2(2), pp. 77-104, 1990.
    • (1990) Journal of Cryptology , vol.2 , Issue.2 , pp. 77-104
    • Simmons, G.J.1
  • 19
    • 0019572642 scopus 로고
    • New hash fuctions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter. New hash fuctions and their use in authentication and set equality. Journal of Computer and System Sciences, 22, pp. 265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.