CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
041624 `Comment | digital signature with 9t; n) shared veri cation based<br />
on discrete logarithms'<br />
WB Lee, CC Chang, Electronics Letters v 31 no 3 (2/2/95) pp 176{177; with reply by<br />
L Harn<br />
The authors show how to forge messages for a signature scheme of Harn, who<br />
proposes a x for the problem in an attached reply.<br />
041625 `A dynamic cryptographic key generation and information broadcasting<br />
scheme in information systems'<br />
HT Liaw, Computers and Security v 13 no 7 (94) pp 601{610<br />
The author proposes a hierarchical key management scheme based on RSA which<br />
enables each user to calculate the secret keys in use at lower levels in a lattice.<br />
041626 `A New Public-Key Cipher Based Upon the Diophantine Equations'<br />
CH Lin, CC Chang, RCT Lee, IEEE Transactions on Computers v 44 no 1 (Jan 95)<br />
pp 13{19<br />
The authors present a knapsack type system which is packaged in Diophantine<br />
equation terminology.<br />
041627 `Can Montgomery Parasites be Avoided? A Design Methodology<br />
Based on Key and Cryptosystem Modi cations'<br />
D Naccache, D M'Ra he, D Raphaeli, Designs, Codes and Cryptography v 5 no 1 (Jan<br />
95) pp 73{80<br />
If everyone is using Montgomery multiplication, then it makes sense to change the<br />
de nitions of the common cryptographic algorithms slightly so that operand scaling<br />
can be dispensed with. The details are set out for a number of popular public key<br />
schemes.<br />
041628 `How to prevent buying of votes in computer elections'<br />
V Niemi, A Renvall, Asiacrypt 94 pp 141{148<br />
Most electronic voting protocols su er from the problem that voters can prove<br />
which way they voted; this makes it possible for votes to be bought or coerced. The<br />
authors had previously proposed a system in which did not possess this property, but<br />
which relied on a trusted third party; in this paper, they show how the candidates can<br />
use secret sharing and multiparty computation techniques to remove this constraint.<br />
041629 `Secure anonymous channel against active attack'<br />
CPark, K Kurosawa, JW-ISC 95 pp 15{23<br />
The authors consider means of countering an attackby P tzmann on an anonymous<br />
channel.<br />
041630 `An entrusted undeniable signature'<br />
SJ Park, KH Lee, DH Won, JW-ISC 95 pp 120{133<br />
The authors propose the concept of an entrusted undeniable signature: the signer<br />
can con rm his signature to averi er without any help, but cannot run a disavowal<br />
protocol without the help of a trusted third party (a court). This scheme is constructed<br />
by the combination of undeniable signatures and zero-knowledge proofs.<br />
041631 `A public-key cryptosystem and a digital signature scheme based<br />
on the Lucas function analogue to discrete logarithms'<br />
P Smith, C Skinner,Asiacrypt 94 pp 298{306<br />
The authors propose basing ElGamal schemes on the corational group of GF (p 2 ),<br />
and claim that these are much stronger than systems based on the rational group.<br />
41