Efficient multi-party digital signature using adaptive secret sharing for low-power devices in wireless networks
暂无分享,去创建一个
[1] Serge Fehr,et al. Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography , 2004, CRYPTO.
[2] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.
[3] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[4] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[5] Manuel Blum,et al. Coin Flipping by Telephone. , 1981, CRYPTO 1981.
[6] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[7] Sorin A. Huss,et al. A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n) , 2002, CHES.
[8] Dapeng Wu,et al. NIS05-2: An Efficient Proactive Share Refreshing Scheme for Secret Sharing in Distributed Systems , 2006, IEEE Globecom 2006.
[9] Johann van der Merwe,et al. A Fully Distributed Proactively Secure Threshold-Multisignature Scheme , 2007, IEEE Transactions on Parallel and Distributed Systems.
[10] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[11] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[12] Andrew M. Odlyzko,et al. Discrete Logarithms in Finite Fields and Their Cryptographic Significance , 1985, EUROCRYPT.
[13] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[14] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[15] Anthony T. Chronopoulos,et al. Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[16] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.