Proactive Security: Long-term protection against break-ins
暂无分享,去创建一个
Ran Canetti | Amir Herzberg | Rosario Gennaro | Dalit Naor | R. Canetti | D. Naor | A. Herzberg | R. Gennaro
[1] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[2] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[3] Ran Canetti,et al. Maintaining Security in the Presence of Transient Faults , 1994, CRYPTO.
[4] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[5] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[6] Mihir Bellare,et al. Advances in Cryptology — CRYPTO '97 , 1996, Lecture Notes in Computer Science.
[7] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[8] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[9] Moti Yung,et al. Proactive RSA , 1997, CRYPTO.
[10] Ran Canetti,et al. Maintaining Authenticated Communication in the Presence of Break-Ins , 1997, PODC '97.
[11] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[12] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[13] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[14] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[15] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[18] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.