Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[2] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[3] Kaoru KUROSAWAzy. New Elgamal Type Threshold Digital Signature Scheme , 1996 .
[4] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[5] Silvio Micali,et al. Optimal algorithms for Byzantine agreement , 1988, STOC '88.
[6] Donald Beaver,et al. Multiparty Protocols Tolerating Half Faulty Processors , 1989, CRYPTO.
[7] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[8] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free? , 1997 .
[11] Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
[12] Susan K. Langford. Threshold DSS Signatures without a Trusted Party , 1995, CRYPTO.
[13] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[14] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[15] K. Kurosawa,et al. New EIGamal Type Threshold Digital Signature Scheme , 1996 .
[16] H. Imai,et al. Efficient and secure multiparty generation of digital signatures based on discrete logarithms , 1993 .
[17] Silvio Micali,et al. An Optimal Algorithm for Synchronous Byzantine Agreement , 1997 .
[18] L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature , 1994 .
[19] Tal Rabin,et al. Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.
[20] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[21] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[22] Markus Jakobsson,et al. Distributed "Magic Ink" Signatures , 1997, EUROCRYPT.
[23] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[24] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[25] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[26] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[27] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[28] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[29] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[30] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[31] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[32] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[33] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[34] Ivan Damgård,et al. Statistical Secrecy and Multi-Bit Commitments , 1996 .
[35] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[36] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[37] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[38] Moti Yung,et al. Witness-based cryptographic program checking and robust function sharing , 1996, STOC '96.
[39] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[40] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[41] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[42] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[43] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 2000, Journal of Cryptology.
[44] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.