MPSS: Mobile Proactive Secret Sharing
暂无分享,去创建一个
[1] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[2] Moses D. Liskov,et al. Mobile proactive secret sharing , 2008, PODC '08.
[3] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[4] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[5] Robbert van Renesse,et al. APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.
[6] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[7] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[8] Moni Naor,et al. Magic Functions: In Memoriam: Bernard M. Dwork 1923--1998 , 2003, JACM.
[9] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[10] Yevgeniy Dodis,et al. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption , 2004, CCS '04.
[11] Rodrigo Rodrigues,et al. Automatic Reconfiguration for Large-Scale Reliable Storage Systems , 2012, IEEE Transactions on Dependable and Secure Computing.
[12] Jeannette M. Wing,et al. Verifiable secret redistribution for archive systems , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..
[13] Sushil Jajodia,et al. Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .
[14] Dan R. K. Ports,et al. Census: Location-Aware Membership Management for Large-Scale Distributed Systems , 2009, USENIX Annual Technical Conference.
[15] Hugo Krawczyk,et al. Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..
[16] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Anna Lysyanskaya,et al. Asynchronous verifiable secret sharing and proactive cryptosystems , 2002, CCS '02.
[19] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[20] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[21] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[22] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[23] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[24] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[25] Kathryn Chen,et al. Authentication in a reconfigurable Byzantine fault tolerant system , 2004 .
[26] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[27] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.