Secure Conference Key Distribution Schemes for Conspiracy Attack
暂无分享,去创建一个
[1] T. Chikazawa,et al. A new key sharing system for global telecommunications , 1990, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition.
[2] E. Okamoto. Proposal for identity-based key distribution systems , 1986 .
[3] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[4] Amos Fiat,et al. Zero Knowledge Proofs of Identity , 1987, STOC.
[5] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[6] Kenji Koyama,et al. Security of Improved Identity-Based Conference Key Distribution Systems , 1988, EUROCRYPT.
[7] Walter Fumy,et al. A Modular Approach to Key Distribution , 1990, CRYPTO.
[8] Chi-Sung Laih,et al. A new threshold scheme and its application in designing the conference key distribution cryptosystem , 1989, Inf. Process. Lett..
[9] Gustavus J. Simmons,et al. A "Weak" Privacy Protocol using the RSA Crypto Algorithm , 1983, Cryptologia.
[10] Kazuo Ohta,et al. A Modification of the Fiat-Shamir Scheme , 1988, CRYPTO.
[11] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[12] Atsushi Shimbo,et al. Cryptanalysis of Several Conference Key Distribution Schemes , 1991, ASIACRYPT.
[13] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[14] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[15] Yacov Yacobi. A Key Distribution "Paradox" , 1990, CRYPTO.