DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
暂无分享,去创建一个
[1] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[2] Peter G. Neumann,et al. The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[5] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[6] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] Joseph Pasquale,et al. Analysis of durability in replicated distributed storage systems , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Matthew Green,et al. Keys under doormats , 2015, J. Cybersecur..
[10] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.