Efficient Multiplicative Sharing Schemes
暂无分享,去创建一个
Yvo Desmedt | Mike Burmester | Simon R. Blackburn | Peter R. Wild | Y. Desmedt | S. Blackburn | M. Burmester | P. Wild
[1] Richard C. Singleton,et al. Maximum distance q -nary codes , 1964, IEEE Trans. Inf. Theory.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[5] Andrew M. Odlyzko,et al. Advances in cryptology -- CRYPTO '86 : proceedings , 1987 .
[6] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[7] Moti Yung,et al. Minimum-Knowledge Interactive Proofs for Decision Problems , 1989, SIAM J. Comput..
[8] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[9] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[10] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[11] Yvo Desmedt,et al. Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract) , 1992, CRYPTO.
[12] J. Feigenbaum. Advances in cryptology--CRYPTO '91 : proceedings , 1992 .
[13] Yvo Desmedt,et al. Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract) , 1992, EUROCRYPT.
[14] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[15] Giovanni Di Crescenzo,et al. Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography , 1994, ASIACRYPT.
[16] Yvo Desmedt,et al. Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group , 1994, SIAM J. Discret. Math..