Threshold Cryptography for Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Alexandra Boldyreva,et al. Efficient threshold signature , multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme , 2002 .
[2] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, EUROCRYPT.
[3] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[4] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[5] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[6] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[7] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[8] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[9] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[10] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[11] Giovanni Di Crescenzo,et al. Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography , 1994, ASIACRYPT.
[12] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[13] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[14] Jacques Stern,et al. One Round Threshold Discrete-Log Key Generation without Private Channels , 2001, Public Key Cryptography.
[15] Giovanni Di Crescenzo,et al. Secure Service Provision for Reliable Server Pooling in MANET , 2004 .
[16] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[17] Jacques Stern,et al. Fully Distributed Threshold RSA under Standard Assumptions , 2001, ASIACRYPT.
[18] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[19] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[20] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[21] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[22] Jonathan Katz,et al. Threshold Cryptosystems Based on Factoring , 2002, ASIACRYPT.
[23] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[24] Moti Yung,et al. Robust efficient distributed RSA-key generation , 1998, STOC '98.
[25] Jan Camenisch,et al. Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.
[26] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[27] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[28] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[29] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[30] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[31] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[32] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[33] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.