Non-interactive Timestamping in the Bounded Storage Model
暂无分享,去创建一个
[1] Ivan Damgård,et al. Collision Free Hash Functions and Public Key Signature Schemes , 1987, EUROCRYPT.
[2] Josh Benaloh,et al. Efficient Broadcast Time-Stamping , 1991 .
[3] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[4] Ran Raz,et al. Error reduction for extractors , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[5] Stuart Haber,et al. Secure names for bit-strings , 1997, CCS '97.
[6] Salil P. Vadhan,et al. On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model , 2003, CRYPTO.
[7] Ronen Shaltiel,et al. Constant-Round Oblivious Transfer in the Bounded Storage Model , 2004, Journal of Cryptology.
[8] Yonatan Aumann,et al. Everlasting security in the bounded storage model , 2002, IEEE Trans. Inf. Theory.
[9] Amnon Ta-Shma,et al. Loss-less condensers, unbalanced expanders, and extractors , 2001, STOC '01.
[10] Amnon Ta-Shma,et al. Storing information with extractors , 2002, Inf. Process. Lett..
[11] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[12] Claude Crépeau,et al. Oblivious transfer with a memory-bounded receiver , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[13] Chi-Jen Lu,et al. Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors , 2002, CRYPTO.
[14] Ahto Buldas,et al. Optimally Efficient Accountable Time-Stamping , 2000, Public Key Cryptography.
[15] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[16] Yan Zong Ding,et al. Oblivious Transfer in the Bounded Storage Model , 2001, CRYPTO.
[17] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[18] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[19] Peeter Laud,et al. New linking schemes for digital time-stamping , 1998, ICISC.
[20] Stuart Haber,et al. Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .
[21] Yonatan Aumann,et al. Information Theoretically Secure Communication in the Limited Storage Space Model , 1999, CRYPTO.
[22] Jan Willemson,et al. Time-Stamping with Binary Linking Schemes , 1998, CRYPTO.
[23] Ueli Maurer,et al. Tight security proofs for the bounded-storage model , 2002, STOC '02.
[24] Aravind Srinivasan,et al. Computing with Very Weak Random Sources , 1999, SIAM J. Comput..
[25] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.