Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

How to exchange (secret) keys

Published: 01 May 1983 Publication History
First page of PDF

References

[1]
ADLEMAN, L., MANDERS, K., AND MILLER, G. On taking roots in finite fields. In Proc. 18th Annual IEEE Symposium on Foundations of Comp. Sci. (Providence, R.I., Oct. 31-Nov. 2, 1977), IEEE, New York, pp. 175-177.
[2]
ANGLUIN, D. Lecture notes on the complexity of some problems in number theory. Tech. Rep. 243, Dept. of Computer Science, Yale University, New Haven, Conn., Aug. 1982.
[3]
BACH, E. Fast algorithms under the extended Riemann hypothesis: A concrete estimate. In Proc. 14th Annual ACM Syrup. on Theory of Computing, (San Francisco, Calif., May 5-7, 1982), ACM, New York, pp. 290-295.
[4]
BERLEKAMP, E.R. Factoring polynomials over large finite fields. Math. Comput. 24, 111 (July 1970), 713-735.
[5]
BLUM, M., AND RABIN, M.O. Mail certification by randomization. In preparation.
[6]
DIFFIE, W., AND HELLMAN, M.E. Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 3 (March 1979), 397-427.
[7]
EVEN, S., GOLDREICH, O., AND LEMPEL, A. A randomized protocol for signing contracts. Tech. Rep. 233, The Technion, Israel, Feb. 1982.
[8]
KOLATA, G. Cryptographers gather to discuss research. Science, 214, 6 (Nov. 1981), 646-647.
[9]
LEVEQUE, W.J. Fundamentals of Number Theory. Addison-Wesley, Reading, Mass., 1977.
[10]
MILLER, G.L. Riemann's hypothesis and a test for primality. J. Comput. Syst. Sci. 13, 3 (Dec. 1976), 300-317.
[11]
PETERSON, I. Whom do you trust. Science News 120, 13 (Sept. 1981), 205-206.
[12]
RABIN, M.O. Digitalized signatures and public-key functions as intractable as factorization. Tech. Rep. 212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass. 1979.
[13]
RABIN, M.O. How to exchange secrets by oblivious transfer. Manuscript, Harvard Center for Research in Computer Technology, Cambridge, Mass., 1981.
[14]
RABIN, M. O. Transaction protection by beacons. Tech. Rep. 29-81, Harvard Center for Research in Computer Technology, Cambridge, Mass., 1981.
[15]
RABIN, M.O. Probabilistic algorithm for testing primality. J. Number Theory 12, 1 (Feb. 1980), 128-138.
[16]
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L.L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120-126.
[17]
SHANKS, D. Solved and Unsolved Problems in Number Theory. Chelsea Publishing Co., New York, N.Y., 1978.
[18]
SOLOVAY, R., AND STRASSEN, V. A fast Monte-Carlo test for primality. SIAM J. Comput. 6, (March 1977), 84-85.

Cited By

View all
  • (2024)Fair$^{2}$2Trade: Digital Trading Platform Ensuring Exchange and Distribution FairnessIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.336219621:5(4827-4842)Online publication date: 1-Sep-2024
  • (2024)SCAFT: A Scalable Crowd-Assisted Fair Trading Protocol2024 IEEE International Conference on Blockchain (Blockchain)10.1109/Blockchain62396.2024.00065(442-449)Online publication date: 19-Aug-2024
  • (2023)Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based AssumptionsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616683(1467-1481)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Computer Systems
ACM Transactions on Computer Systems  Volume 1, Issue 2
May 1983
96 pages
ISSN:0734-2071
EISSN:1557-7333
DOI:10.1145/357360
  • Editor:
  • Anita K. Jones
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 1983
Published in TOCS Volume 1, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptography
  2. factorization
  3. protocols
  4. public key encryption
  5. secrets
  6. security
  7. transaction protection protocols

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)158
  • Downloads (Last 6 weeks)31
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Fair$^{2}$2Trade: Digital Trading Platform Ensuring Exchange and Distribution FairnessIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.336219621:5(4827-4842)Online publication date: 1-Sep-2024
  • (2024)SCAFT: A Scalable Crowd-Assisted Fair Trading Protocol2024 IEEE International Conference on Blockchain (Blockchain)10.1109/Blockchain62396.2024.00065(442-449)Online publication date: 19-Aug-2024
  • (2023)Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based AssumptionsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616683(1467-1481)Online publication date: 15-Nov-2023
  • (2023)SoK: Delay-Based Cryptography2023 IEEE 36th Computer Security Foundations Symposium (CSF)10.1109/CSF57540.2023.00028(169-183)Online publication date: Jul-2023
  • (2023)BDTS: Blockchain-Based Data Trading SystemInformation and Communications Security10.1007/978-981-99-7356-9_38(645-664)Online publication date: 18-Nov-2023
  • (2023)Game-Theoretically Secure Protocols for the Ordinal Random Assignment ProblemApplied Cryptography and Network Security10.1007/978-3-031-33491-7_22(582-610)Online publication date: 19-Jun-2023
  • (2022)Atomic cross-chain exchanges of shared assetsProceedings of the 4th ACM Conference on Advances in Financial Technologies10.1145/3558535.3559786(148-160)Online publication date: 19-Sep-2022
  • (2022)Tighter Bounds on MultiParty Coin Flipping via Augmented Weak Martingales and Differentially Private SamplingSIAM Journal on Computing10.1137/18M121078251:4(1126-1171)Online publication date: 1-Jan-2022
  • (2022)On the complexity of fair coin flippingTheoretical Computer Science10.1016/j.tcs.2022.02.010914(23-38)Online publication date: May-2022
  • (2021)Practical Exchange for Unique Digital Goods2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)10.1109/DAPPS52256.2021.00011(49-58)Online publication date: Aug-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media