Toward Fair International Key Escrow
暂无分享,去创建一个
[1] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.
[2] Dieter Gollmann,et al. Key Escrow in Mutually Mistrusting Domains , 1996, Security Protocols Workshop.
[3] Henri Cohen,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[4] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[5] Peter Winkler,et al. A Key Escrow System with Warrant Bounds , 1995, CRYPTO.
[6] Moti Yung,et al. Distributed Public Key Cryptosystems , 1998, Public Key Cryptography.
[7] Reihaneh Safavi-Naini,et al. Democratic Key Escrow Scheme , 1997, ACISP.
[8] Moti Yung,et al. Escrow Encryption Systems Visited: Attacks, Analysis and Designs , 1995, CRYPTO.
[9] Chris J. Mitchell,et al. A Proposed Architecture for Trusted Third Party Services , 1995, Cryptography: Policy and Algorithms.
[10] Peter G. Neumann,et al. The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..
[11] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[12] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[13] Dorothy E. Denning,et al. A taxonomy for key recovery encryption systems , 1997 .
[14] Dorothy E. Denning,et al. A taxonomy for key escrow encryption systems , 1996, CACM.
[15] Eric R. Verheul,et al. Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals , 1997, EUROCRYPT.
[16] Mihir Bellare,et al. Verifiable partial key escrow , 1997, CCS '97.
[17] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Moti Yung,et al. Auto-recoverable Auto-certifiable Cryptosystems (A Survey) , 1999, CQRE.
[20] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[21] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[22] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[23] Moti Yung,et al. Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy , 1999, Public Key Cryptography.
[24] Robert H. Deng,et al. Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow , 1997, ACISP.
[25] Silvio Micali,et al. Fair Public-Key Cryptosystems , 1992, CRYPTO.
[26] Moti Yung,et al. Robust efficient distributed RSA-key generation , 1998, STOC '98.
[27] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[28] Gustavus J. Simmons,et al. A "Weak" Privacy Protocol using the RSA Crypto Algorithm , 1983, Cryptologia.
[29] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[30] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[31] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[32] Joe Kilian,et al. Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract) , 1995, CRYPTO.
[33] Yvo Desmedt. Treshold Cryptosystems (invited talk) , 1992, AUSCRYPT.
[34] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[35] Ernest F. Brickell,et al. SKIPJACK review: interim report , 1995 .