On the Computational Security of a Distributed Key Distribution Scheme
暂无分享,去创建一个
[1] Jan Camenisch,et al. Group signature schemes and payment systems based on the discrete logarithm problem , 1998 .
[2] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[3] Daniele Micciancio,et al. Simultaneous broadcast revisited , 2005, PODC '05.
[4] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[5] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[6] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[7] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[8] Emmanuel Bresson,et al. Constant Round Authenticated Group Key Agreement via Distributed Computation , 2004, Public Key Cryptography.
[9] Douglas R. Stinson,et al. On Unconditionally Secure Robust Distributed Key Distribution Centers , 2002, ASIACRYPT.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[13] Moni Naor,et al. Distributed Pseudo-random Functions and KDCs , 1999, EUROCRYPT.
[14] Germán Sáez,et al. Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join , 2003, ACISP.
[15] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[16] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[17] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[18] Jonathan Katz,et al. Scalable Protocols for Authenticated Group Key Exchange , 2003, CRYPTO.
[19] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[20] Carles Padró,et al. A Distributed and Computationally Secure Key Distribution Scheme , 2002, ISC.
[21] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[22] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[23] Germán Sáez,et al. Protocols useful on the Internet from distributed signature schemes , 2004, International Journal of Information Security.
[24] PointchevalDavid,et al. Security Arguments for Digital Signatures and Blind Signatures , 2000 .
[25] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[26] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[27] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[28] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[29] Carles Padró,et al. Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures , 2001, Theor. Comput. Sci..
[30] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[31] Reihaneh Safavi-Naini,et al. A Group Key Distribution Scheme with Decentralised User Join , 2002, SCN.
[32] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.