Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[3] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[4] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[5] Victor Shoup,et al. Secure and efficient asynchronous broadcast protocols : (Extended abstract) , 2001, CRYPTO 2001.
[6] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[7] Ran Canetti,et al. Maintaining Security in the Presence of Transient Faults , 1994, CRYPTO.
[8] Anna Lysyanskaya,et al. Asynchronous verifiable secret sharing and proactive cryptosystems , 2002, CCS '02.
[9] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.
[10] Victor Shoup,et al. Secure and Efficient Asynchronous Broadcast Protocols , 2001, CRYPTO.
[11] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[12] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[13] Moni Naor,et al. Distributed Pseudo-random Functions and KDCs , 1999, EUROCRYPT.
[14] Reto Strobl,et al. Distributed cryptographic protocols in asynchronous networks with universal composability , 2005 .
[15] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[16] Bartosz Przydatek,et al. Asynchronous proactive cryptosystems without agreement , 2004 .
[17] Michael Backes,et al. Proactive secure message transmission in asynchronous networks , 2003, PODC '03.
[18] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[19] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[20] Jesper Buus Nielsen,et al. A Threshold Pseudorandom Function Construction and Its Applications , 2002, CRYPTO.
[21] Ran Canetti,et al. Fast asynchronous Byzantine agreement with optimal resilience , 1993, STOC.
[22] Ran Canetti,et al. Proactive Security: Long-term protection against break-ins , 1997 .
[23] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, EUROCRYPT.
[24] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure On-Line Services , 2001 .
[25] Elaine B. Barker. Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST , 1994 .
[26] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[27] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[28] Ran Canetti,et al. Maintaining Authenticated Communication in the Presence of Break-Ins , 2000, Journal of Cryptology.
[29] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.