15.08.2012 Views

CONTENTS - Emerald

CONTENTS - Emerald

CONTENTS - Emerald

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

041624 `Comment | digital signature with 9t; n) shared veri cation based<br />

on discrete logarithms'<br />

WB Lee, CC Chang, Electronics Letters v 31 no 3 (2/2/95) pp 176{177; with reply by<br />

L Harn<br />

The authors show how to forge messages for a signature scheme of Harn, who<br />

proposes a x for the problem in an attached reply.<br />

041625 `A dynamic cryptographic key generation and information broadcasting<br />

scheme in information systems'<br />

HT Liaw, Computers and Security v 13 no 7 (94) pp 601{610<br />

The author proposes a hierarchical key management scheme based on RSA which<br />

enables each user to calculate the secret keys in use at lower levels in a lattice.<br />

041626 `A New Public-Key Cipher Based Upon the Diophantine Equations'<br />

CH Lin, CC Chang, RCT Lee, IEEE Transactions on Computers v 44 no 1 (Jan 95)<br />

pp 13{19<br />

The authors present a knapsack type system which is packaged in Diophantine<br />

equation terminology.<br />

041627 `Can Montgomery Parasites be Avoided? A Design Methodology<br />

Based on Key and Cryptosystem Modi cations'<br />

D Naccache, D M'Ra he, D Raphaeli, Designs, Codes and Cryptography v 5 no 1 (Jan<br />

95) pp 73{80<br />

If everyone is using Montgomery multiplication, then it makes sense to change the<br />

de nitions of the common cryptographic algorithms slightly so that operand scaling<br />

can be dispensed with. The details are set out for a number of popular public key<br />

schemes.<br />

041628 `How to prevent buying of votes in computer elections'<br />

V Niemi, A Renvall, Asiacrypt 94 pp 141{148<br />

Most electronic voting protocols su er from the problem that voters can prove<br />

which way they voted; this makes it possible for votes to be bought or coerced. The<br />

authors had previously proposed a system in which did not possess this property, but<br />

which relied on a trusted third party; in this paper, they show how the candidates can<br />

use secret sharing and multiparty computation techniques to remove this constraint.<br />

041629 `Secure anonymous channel against active attack'<br />

CPark, K Kurosawa, JW-ISC 95 pp 15{23<br />

The authors consider means of countering an attackby P tzmann on an anonymous<br />

channel.<br />

041630 `An entrusted undeniable signature'<br />

SJ Park, KH Lee, DH Won, JW-ISC 95 pp 120{133<br />

The authors propose the concept of an entrusted undeniable signature: the signer<br />

can con rm his signature to averi er without any help, but cannot run a disavowal<br />

protocol without the help of a trusted third party (a court). This scheme is constructed<br />

by the combination of undeniable signatures and zero-knowledge proofs.<br />

041631 `A public-key cryptosystem and a digital signature scheme based<br />

on the Lucas function analogue to discrete logarithms'<br />

P Smith, C Skinner,Asiacrypt 94 pp 298{306<br />

The authors propose basing ElGamal schemes on the corational group of GF (p 2 ),<br />

and claim that these are much stronger than systems based on the rational group.<br />

41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!