메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 276-280

A ROBUST THRESHOLD ELLIPTIC CURVE DIGITAL SIGNATURE PROVIDING A NEW VERIFIABLE SECRET SHARING SCHEME

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 85150432710     PISSN: 15483746     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MWSCAS.2003.1562272     Document Type: Conference Paper
Times cited : (15)

References (27)
  • 2
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure veriable secret sharing
    • J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science 576
    • T. P. Pedersen. Non-interactive and information-theoretic secure veriable secret sharing. In J. Feigenbaum, editor, Proceedings CRYPTO '91, pages 129-140. Springer, 1992. Lecture Notes in Computer Science No. 576.
    • (1992) Proceedings CRYPTO '91 , pp. 129-140
    • Pedersen, T.P.1
  • 3
    • 84957705004 scopus 로고    scopus 로고
    • An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm
    • Springer-Verlag, Berlin Heidelberg New York
    • N. Koblitz, An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. In: Advances in Cryptology - Crypto '98. Lecture Notes in Computer Science, Vol. 1462. Springer-Verlag, Berlin Heidelberg New York (1998) 327-337
    • (1998) Advances in Cryptology - Crypto '98. Lecture Notes in Computer Science , vol.1462 , pp. 327-337
    • Koblitz, N.1
  • 4
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. J. Menezes, T. Okamoto, and S. A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory, 39 (1993), pp. 1639-1646
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.A.3
  • 6
    • 85150472723 scopus 로고
    • An Implementation of Elliptic Curve Cryptosystems over F 2-155 IEEE Journal SelectedAreas in Commutnications
    • June
    • G. B. Agnew, R. C. Mullin, and S. A. Vanstone, "An Implementation of Elliptic Curve Cryptosystems over F 2-155 ", IEEE Journal onl SelectedAreas in Commutnications, Vol. I1, No. 5, June, 1993.
    • (1993) , vol.11 , Issue.5
    • Agnew, G.B.1    Mullin, R.C.2    Vanstone, S.A.3
  • 7
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 48, pp. 203-209, 1987
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 8
    • 0000838441 scopus 로고
    • Use of Elliptic Curve in Cryptography
    • Santa Barbara, Calif., 1985), LNCS. Spring- Verlag
    • V.S. Miller, Use of Elliptic Curve in Cryptography, In Advances in CryptologyCRYPTO '85(Santa Barbara, Calif., 1985), LNCS.2 18, Spring- Verlag, pp.417-426, 1986.
    • (1986) Advances in CryptologyCRYPTO '85 , vol.2 , Issue.18 , pp. 417-426
    • Miller, V.S.1
  • 9
    • 0018545449 scopus 로고
    • How to Share a Secret
    • November
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22(11), pp. 612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 12
    • 0027580298 scopus 로고
    • Efficient and secure multiparty generation of digital signatures based on discrete logarithm
    • M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithm. IEICE Trans. on Fund. Electr. Comm. and Comp. Sci., E76- A(4):532-545, 1993.
    • (1993) IEICE Trans. on Fund. Electr. Comm. and Comp. Sci. , vol.76 , Issue.4 , pp. 532-545
    • Cerecedo, M.1    Matsumoto, T.2    Imai, H.3
  • 13
    • 0028508211 scopus 로고
    • Group-oriented (t,n) threshold digital signature scheme and digital multisignature
    • September
    • L. Ham, "Group-oriented (t,n) threshold digital signature scheme and digital multisignature ", IEE Proc.-Comput. Digit. Tech., Vol. 141, No. 5, September, (1994), pp. 307-313.
    • (1994) IEE Proc.-Comput. Digit. Tech. , vol.141 , Issue.5 , pp. 307-313
    • Ham, L.1
  • 14
    • 84948004356 scopus 로고
    • Threshold DSS Signatures without a Trusted Party
    • LNCS Springer- Verlag
    • Langford, Threshold DSS Signatures without a Trusted Party, Proc. CR YPTO'95, LNCS 963, Springer- Verlag, 1995.
    • (1995) Proc. CR YPTO'95 , vol.963
    • Langford1
  • 18
    • 0842304790 scopus 로고    scopus 로고
    • Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-group Signature Scheme
    • A. Boldyreva, "Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-group Signature Scheme", Public Key Cryptography - PKC 2003.
    • (2003) Public Key Cryptography - PKC
    • Boldyreva, A.1
  • 19
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Informn. Theory 31:469-472, 1985.
    • (1985) IEEE Trans. Informn. Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 20
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. P. Schnorr, Efficient signature generation by smart cards, Journal ofCryptology4:161-174, 1991.
    • (1991) Journal ofCryptology4 , pp. 161-174
    • Schnorr, C.P.1
  • 21
    • 0024940038 scopus 로고
    • Non-Cryptographic Fault-Tolerant Computing in a Constant Number ofRounds
    • J. Bar-Ilan, and D. Beaver, "Non-Cryptographic Fault-Tolerant Computing in a Constant Number ofRounds", Proc. of8th PODC, pp. 201-209, 1989.
    • (1989) Proc. of8th PODC , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 23
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", 20th STOC, pp. 1-10, 1988.
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 24
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or. "Verifiable secret sharing and multiparty protocols with honest majority". In Proc. 21st ACM Symposium on Theory ofComputing, pages 73-85, 1989.
    • (1989) Proc. 21st ACM Symposium on Theory ofComputing , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 25
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • Springer Verlag
    • A.Herzberg, S.Jarecki, H.Krawczyk, M.Yung, "Proactive secret sharing or: How to cope with perpetual leakage", LNCS 963, Proc. Crypto'95, Springer Verlag, (1995), pp. 339-352.
    • (1995) LNCS 963, Proc. Crypto'95 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 26
    • 0010224921 scopus 로고
    • Secret sharing homomorphisms: Keeping a secret secret
    • Springer Verlag
    • J.C. Benaloh, "Secret sharing homomorphisms: Keeping a secret secret"; Proc. of Crypto '86, Lecture Notes on Comput. Sci., 263 Springer Verlag (1986) 251-260.
    • (1986) Proc. of Crypto '86, Lecture Notes on Comput. Sci. , vol.263 , pp. 251-260
    • Benaloh, J.C.1
  • 27
    • 0010224921 scopus 로고
    • Secret sharing homomorphisms: Keeping a secret secret
    • Springer Verlag
    • J.C. Benaloh, "Secret sharing homomorphisms: Keeping a secret secret"; Proc. of Crypto '86, Lecture Notes on Comput. Sci., 263 Springer Verlag (1986) 251-260.
    • (1986) Proc. of Crypto '86, Lecture Notes on Comput. Sci. , vol.263 , pp. 251-260
    • Benaloh, J.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.