How to share a function securely
暂无分享,去创建一个
Moti Yung | Yvo Desmedt | Alfredo De Santis | Yair Frankel | A. D. Santis | M. Yung | Y. Desmedt | Y. Frankel
[1] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[2] Oded Goldreich,et al. RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..
[3] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Tatsuaki Okamoto,et al. A digital multisignature scheme using bijective public-key cryptosystems , 1988, TOCS.
[7] Silvio Micali,et al. Fair Public-Key Cryptosystems , 1992, CRYPTO.
[8] E. Wright,et al. An Introduction to the Theory of Numbers , 1939 .
[9] Silvio Micali,et al. How To Sign Given Any Trapdoor Function , 1988, CRYPTO.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[12] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[13] Moti Yung,et al. Minimum-Knowledge Interactive Proofs for Decision Problems , 1989, SIAM J. Comput..
[14] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[15] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[16] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[17] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[18] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[19] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[20] Lewis M. Branscomb,et al. To tap or not to tap , 1993, CACM.
[21] Matthew K. Franklin,et al. Secure and Efficient Off-Line Digital Money (Extended Abstract) , 1993, ICALP.
[22] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[23] Josh Benaloh,et al. Secret sharing homomorphisms: keeping shares of a secret secret , 1987, CRYPTO 1987.
[24] Silvio Micali,et al. How to sign given any trapdoor permutation , 1992, JACM.
[25] Michael K. Reiter,et al. How to securely replicate services , 1994, TOPL.
[26] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[27] Ronald L. Rivest,et al. Responses to NIST's proposal , 1992, CACM.