Distributed RSA Signature Schemes for General Access Structures
暂无分享,去创建一个
[1] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[2] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[3] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[4] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[5] Ronald Cramer,et al. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups , 2002, CRYPTO.
[6] L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature , 1994 .
[7] Moti Yung,et al. Robust efficient distributed RSA-key generation , 1998, STOC '98.
[8] Douglas R. Stinson,et al. Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates , 2001, ACISP.
[9] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[12] Shai Halevi,et al. Computing Inverses over a Shared Secret Modulus , 2000, EUROCRYPT.
[13] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[14] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[15] Moti Yung,et al. Proactive RSA , 1997, CRYPTO.
[16] Ivan Damgård,et al. Practical Threshold RSA Signatures without a Trusted Dealer , 2000, EUROCRYPT.
[17] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[18] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[19] Jacques Stern,et al. Fully Distributed Threshold RSA under Standard Assumptions , 2001, ASIACRYPT.
[20] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[21] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[22] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[23] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[24] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[25] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..