Secure distributed storage and retrieval
暂无分享,去创建一个
[1] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[2] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[3] Moti Yung,et al. Proactive RSA , 1997, CRYPTO.
[4] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[5] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[6] Moti Yung,et al. Witness-based cryptographic program checking and robust function sharing , 1996, STOC '96.
[7] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[8] Tal Rabin,et al. Secure distributed storage and retrieval , 1997, Theor. Comput. Sci..
[9] Ran Canetti,et al. Maintaining Security in the Presence of Transient Faults , 1994, CRYPTO.
[10] R. Blahut. Theory and practice of error control codes , 1983 .
[11] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[12] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[13] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[14] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[15] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[16] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[17] Hugo Krawczyk. Distributed fingerprints and secure information dispersal , 1993, PODC '93.
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[19] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[20] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[21] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[22] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[23] K. Kurosawa,et al. New EIGamal Type Threshold Digital Signature Scheme , 1996 .
[24] H. Imai,et al. Efficient and secure multiparty generation of digital signatures based on discrete logarithms , 1993 .
[25] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[26] L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature , 1994 .
[27] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[28] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[29] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.