Robust Threshold DSS Signatures
暂无分享,去创建一个
Hugo Krawczyk | Tal Rabin | Rosario Gennaro | Stanislaw Jarecki | T. Rabin | H. Krawczyk | R. Gennaro | S. Jarecki | Stanislaw Jarecki
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[4] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[5] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[6] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[7] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[8] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[9] Silvio Micali,et al. Optimal algorithms for Byzantine agreement , 1988, STOC '88.
[10] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[11] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[12] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[13] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[14] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[15] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[16] Gustavus J. Simmons,et al. A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.
[17] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[18] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[19] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[20] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[21] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[22] H. Imai,et al. Efficient and secure multiparty generation of digital signatures based on discrete logarithms , 1993 .
[23] Patrick Horster,et al. Meta-ElGamal signature schemes , 1994, CCS '94.
[24] Rainer A. Rueppel,et al. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[25] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[26] L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature , 1994 .
[27] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[28] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[29] Susan K. Langford. Threshold DSS Signatures without a Trusted Party , 1995, CRYPTO.
[30] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[31] Rosario Gennaro,et al. Theory and practice of verifiable secret sharing , 1996 .
[32] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[33] Kaoru KUROSAWAzy. New Elgamal Type Threshold Digital Signature Scheme , 1996 .
[34] Moti Yung,et al. Witness-based cryptographic program checking and robust function sharing , 1996, STOC '96.
[35] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[36] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[37] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.