Proactive Secret Sharing in Dynamic Environments
暂无分享,去创建一个
A. Juels | D. Song | Fan Zhang | Yupeng Zhang | Lun Wang | Andrew Low | D. Krishna
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[3] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[4] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[5] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[6] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[7] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[8] Silvio Micali,et al. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..
[9] Sushil Jajodia,et al. Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .
[10] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[11] Douglas R. Stinson,et al. Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures , 1999, Selected Areas in Cryptography.
[12] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[13] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[14] Anna Lysyanskaya,et al. Asynchronous verifiable secret sharing and proactive cryptosystems , 2002, CCS '02.
[15] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[16] Jeannette M. Wing,et al. Verifiable secret redistribution for archive systems , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..
[17] Svetla Nikova,et al. On Proactive Secret Sharing Schemes , 2004, Selected Areas in Cryptography.
[18] Robbert van Renesse,et al. APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.
[19] Jeong Hyun Yi,et al. Efficient node admission for short-lived mobile ad hoc networks , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).
[20] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[21] Moses D. Liskov,et al. Mobile proactive secret sharing , 2008, PODC '08.
[22] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[23] Shlomi Dolev,et al. Swarming secrets , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[24] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[25] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.
[26] Douglas R. Stinson,et al. Unconditionally secure social secret sharing scheme , 2010, IET Inf. Secur..
[27] Aniket Kate,et al. Computational Verifiable Secret Sharing Revisited , 2011, ASIACRYPT.
[28] Douglas R. Stinson,et al. On dealer-free dynamic threshold schemes , 2013, Adv. Math. Commun..
[29] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[30] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[31] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[32] MacLane Wilkison,et al. NuCypher KMS: Decentralized key management system , 2017, ArXiv.
[33] Helix : A Scalable and Fair Consensus Algorithm , 2018 .
[34] Enis Ceyhun Alp,et al. C ALYPSO : Auditable Sharing of Private Data over Blockchains , 2018 .
[35] Dawn Xiaodong Song,et al. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution , 2018, ArXiv.