New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Low-Exponent RSA with Related Messages , 1996, EUROCRYPT.
[2] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[3] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[4] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[5] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[6] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[7] Matthew K. Franklin,et al. The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[8] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[9] Mike Burmester,et al. Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing , 1996, EUROCRYPT.
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[11] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[12] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[13] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[14] Moti Yung,et al. Proactive RSA , 1997, CRYPTO.
[15] Stanislav,et al. Robust and E cient Sharing of RSA FunctionsRosario , 1996 .
[16] Yair Frankel,et al. A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.
[17] M. Stadler. Publicly Veriiable Secret Sharing , 1996 .
[18] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[19] Birgit Pfitzmann,et al. How to break fraud-detectable key recovery , 1998, OPSR.
[20] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[21] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[22] Moti Yung,et al. Witness-based cryptographic program checking and robust function sharing , 1996, STOC '96.
[23] N. Asokan,et al. Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.
[24] Ivan Damgård,et al. New Convertible Undeniable Signature Schemes , 1996, EUROCRYPT.
[25] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[26] Mihir Bellare,et al. Advances in Cryptology — CRYPTO '97 , 1996, Lecture Notes in Computer Science.
[27] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[28] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 1997, Journal of Cryptology.
[29] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[30] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[31] Tal Rabin,et al. Secure distributed storage and retrieval , 1997, Theor. Comput. Sci..
[32] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[33] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[34] Matthew K. Franklin,et al. Verifiable Signature Sharing , 1995, EUROCRYPT.
[35] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[36] Adi Shamir,et al. How to share a secret , 1979, CACM.
[37] Silvio Micali,et al. Fair Public-Key Cryptosystems , 1992, CRYPTO.
[38] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[39] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.