Robust and Efficient Sharing of RSA Functions
暂无分享,去创建一个
Hugo Krawczyk | Tal Rabin | Rosario Gennaro | Stanislaw Jarecki | T. Rabin | H. Krawczyk | R. Gennaro | Stanislaw Jarecki
[1] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[2] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[3] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[4] Moti Yung,et al. Witness-based cryptographic program checking and robust function sharing , 1996, STOC '96.
[5] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[6] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[7] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[8] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[9] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[10] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[11] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[12] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[13] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[16] Silvio Micali,et al. Fair Public-Key Cryptosystems , 1992, CRYPTO.
[17] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[18] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[19] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[20] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[21] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[22] Oded Goldreich,et al. Foundations of Cryptography (Fragments of a Book) , 1995 .
[23] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[24] H. Imai,et al. Efficient and secure multiparty generation of digital signatures based on discrete logarithms , 1993 .
[25] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 1997, Journal of Cryptology.
[26] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[27] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[28] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[29] Tal Rabin,et al. Secure distributed storage and retrieval , 1997, Theor. Comput. Sci..
[30] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[31] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[32] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[33] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[34] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..