參考文獻 |
R. Aditya, K. Peng, C. Boyd, E. Dawson, and B. Lee, ``Batch
Verification for Equality of Discrete Logarithms and Threshold
Decryptions,' emph{ACNS 04}, LNCS, Vol. 3089, pp. 494-508,
Springer-Verlag, 2004.
N. Baric and B. Pfitzmann, ``Collision-free Accumulators and
Fail-stop Signature Schemes without Trees,' emph{Advances in
Cryptology -- Eurocrypt'97}, LNCS, Vol. 1233, pp. 480--494,
Springer-Verlag, 1997.
M. Bellare, J.A. Garay, and T. Rabin, ``Fast Batch Verification
for Modular Exponentiation and Digital Signarues,' emph{Advances
in Cryptology -- Eurocrypt'98}, LNCS, Vol. 1403, pp. 236--250,
Springer-Verlag, 1998.
M. Bellare, J.A. Garay, and T. Rabin, ``Fast Batch Verification
for Modular Exponentiation and Digital Signarues,' available
online at http://www-cse.ucsd.edu/users/mihir.
M. Bellare and P.Rogaway, ``Random Oracles are Practical: a
Paradigm for Designing Efficient Protocols,' emph{In 1st Conf.
on Computer and Communications Security, ACM}, pp. 62--73, 1993.
C. Boyd, E. Foo, and C. Pavlovski, ``Efficient Electronic Cash
Using Batch Signatures,' emph{Information Security and Privacy
-- ACISP'99}, LNCS, Vol. 1587, pp. 244--257, Springer-Verlag,
1999.
C. Boyd and C. Pavlovski, ``Attacking and Repairing Batch
Verification Schemes,' emph{Advances in Cryptology -- Asiacrypt
2000}, LNCS, Vol. 1976, pp. 58--71, Springer-Verlag, 2000.
J. Camenisch and M. Michels, ``Proving in Zero-Knowledge that a
Number Is the Product of Two Safe Primes', emph{Advances in
Cryptology -- Eurocrypt'99}, LNCS, Vol. 1592, pp. 107--122, 1999.
T. Cao, D. Lin, and R. Xue, ``Security Analysis of Some Batch
Verifying Signatures from Pairings', emph{International Journal
of Network Security}, Vol. 3, No. 1, pp. 58--63, 2005.
D. Chaum, A. Fiat, and M. Naor, ``Untraceable Electronic Cash,'
emph{Advances in Cryptology -- Crypto'88}, pp. 319--227, 1988.
J.S. Coron and D. Naccache, ``On The Security of RSA Screening,'
emph{PKC 99}, LNCS, Vol. 1560, pp. 197--203, Springer-Verlag,
1999.
G. Davida, ``Chosen Signature Cryptanalysis of the RSA (MIT)
Public-key Cryptosystem', Technical report TR-CS-82-2, Department
of EECS, University of Wisconsin, 1982.
Y. Desmedtg and Y. Frankel, ``Threshold Cryptosystems,'
emph{Advances in Cryptology -- Crypt'89 }, LNCS, Vol. 435,
pp.307--315, Springer-Verlag, 1990.
Y. Desmedtg and Y. Frankel, ``Shared Generation of Authenticators
and Signatures,' emph{Advances in Cryptology -- Crypto'91},
LNCS, Vol. 576, pp.457--569, Springer-Verlag, 1992.
Y. Desmedt and Y. Frankel, ``Parallel Reliable Threshold
Multisignature,' Technical report TR-92-04-02, Department of
EECS, University of Wisconsin-Milwaukee, 1992.
A. Fiat, ``Batch RSA,' emph{Advances in Cryptology --
Crypto'89}, LNCS, Vol. 435, pp. 175--185, Springer-Verlag, 1990.
A. Fiat, ``Batch RSA,' emph{Journal of Cryptology}, Vol.10,
Springer-Verlag, pp.75-88, 1997.
P. Fouque, G. Poupard, and J. Stern, ``Sharing Decryption in the
Context of Voting or Lotteries,' emph{Financial Cryptology -- FC
2000}, LNCS, Vol. 1962, pp.90--104, Spring-Verlag, 2001.
R. Gennaro, S. Halevi, and T. Rabin, ``Secure Hash-and-Sign
Signatures without The Random Oracle,' emph{Advances in
Cryptology -- Eurocrypt'99}, LNCS, Vol. 1592, pp.123--139,
Springer-Verlag, 1999.
R. Gennaro, H. Krawczyk, and T. Rabin, ``RSA-Based Undeniable
Signatures,' emph{Advances in Cryptology -- Crypto'97}, pp.
132--149, Spring-Verlag, 1997.
L. Harn, ``Batch Verifying Multiple DSA-type Digital Signatures,'
emph{Electronics Letterrs}, Vol. 34, No. 9, pp. 870--871, 30th
April 1998.
L. Harn, ``Batch Verifying Multiple RSA Digital Signatures,'
emph{Electronics Letterrs}, Vol. 34, No. 12, pp. 1219--1220, 30th
April 1998.
M.S. Hwang, C.C. Lee, and Y.L. Tang, ``Two Simple Batch Verifying
Multiple Digital Signatures,' emph{Proceeding of ICICS 2001},
LNCS, Vol. 2229, pp. 233--237, Springer-Verlag, 2001.
G. Miller, ``Riemann's Hypothesis and Tests for Primality',
emph{7th ACM Symposium on the Theory of Computing}, May 1975.
R.C. Merkle, ``A Certified Digital Signature,' emph{Advances in
Cryptology -- Crypto'89}, LNCS, Vol. 435, pp.218--238,
Springer-Verlag, 1990.
D. M'Ra"{i}hi and D. Naccache, ``Batch Exponentiation - A Fast
DLP-Based Signature Generation Strategy,' emph{3rd ACM
Conference on Computer and Communications Security}, pp. 58--61,
1996.
D. Naccache, D. M'Ra"{i}hi, D. Raphaeli, and S. Vaudenay, ``Can
DSA be Improved: Complexity Trade-Off with the Digital Signature
Standard,' emph{Advances in Cryptology -- Eurocrypt'94}, LNCS,
Vol. 950, pp. 85--94, Springer-Verlag, 1994.
C.J. Pavlovski and C. Boyd, ``Efficient Batch Signature Generation
Using Tree Structures,' emph{CrypTEC'99}, pp. 70--77, 1999.
M. Rabin, ``Probabilistic Algorithms for Primality Testing',
emph{Journal of Number Theory}, December 1980.
R.L. Rivest, A. Shamir, and L. Adleman, ``A Method for Obtaining
Digital Signatures and Public-key Cryptosystem,' {em Commun. of
ACM}, Vol.21, No.2, pp.120-126, 1978.
A. Shamir, ``How to Share a Secret,' emph{Commun. of ACM},
22:612--613, 1979.
C.P. Schnorr, ``Efficient Identification and Signatures for Smart
Cards,' emph{Advances in Cryptology --- Crypto'89}, LNCS, vol.
435, pp. 239--252, Springer-Verlag, 1990.
V. Shoup, ``Practical Threshold Signatures', technical report,
IBM, 1999, IBM Research Report RZ 3121.
S.M. Yen, C.S. Laih, and A.K. Lenstra, ``Multi-exponentiation,'
emph{IEE Proceedings, Part E: Computers and Digital Techniques},
Vol. 141, No. 6, pp. 325--326, 1994.
S.M. Yen and C.S. Lain, ``Improved Digital Signature Suitable for
Batch Verification,' emph{IEEE Transcations on Computers}, Vol.
44, No. 7, pp. 957--959, July 1995.
H. Yoon, J.H. Cheon, and Y.Kim, ``Batch Verifications with
ID-based Signatures,' emph{Information Security and Cryptology
-- ICISC'04}, LNCS, Vol. 3506, pp. 233--248, Springer-Verlag,
2005.
F. Zhang and K. Kim, ``Efficient ID-based Blind Signature and
Proxy Signature from Bilinear Pairings,' emph{Information
Security and Privacy -- ACISP'03}, LNCS, Vol. 2727, pp. 312--323,
Springer-Verlag, 2003. |