Effort-Release Public-Key Encryption from Cryptographic Puzzles
暂无分享,去创建一个
[1] Bogdan Warinschi,et al. Security Notions and Generic Constructions for Client Puzzles , 2009, ASIACRYPT.
[2] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[3] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[4] Colin Boyd,et al. Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols , 2011, CT-RSA.
[5] Ari Juels,et al. $evwu Dfw , 1998 .
[6] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[7] Dimitrios Hristu-Varsakelis,et al. Improved Anonymous Timed-Release Encryption , 2007, ESORICS.
[8] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[9] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[10] Siu-Ming Yiu,et al. Timed-Release Encryption Revisited , 2008, ProvSec.
[11] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[12] Mihir Bellare,et al. Encapsulated Key Escrow , 1996 .
[13] Colin Boyd,et al. An integrated approach to cryptographic mitigation of denial-of-service attacks , 2011, ASIACCS '11.
[14] Jung Hee Cheon,et al. Provably Secure Timed-Release Public Key Encryption , 2008, TSEC.
[15] Douglas R. Stinson,et al. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.
[16] Colin Boyd,et al. Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection , 2011, ICISC.
[17] Mihir Bellare,et al. Verifiable partial key escrow , 1997, CCS '97.
[18] David Pointcheval,et al. REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform , 2001, CT-RSA.