Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange
暂无分享,去创建一个
[1] Silvio Micali,et al. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[2] Silvio Micali,et al. A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.
[3] Roger Fajman. An Extensible Message Format for Message Disposition Notifications , 1998, RFC.
[4] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[5] Li Gong,et al. Proceedings of the 4th ACM conference on Computer and communications security , 1996, CCS 1997.
[6] Manuel Blum,et al. How to exchange (secret) keys , 1983, TOCS.
[7] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[8] Richard Cleve,et al. Controlled Gradual Disclosure Schemes for Random Bits and Their Applications , 1989, CRYPTO.
[9] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[10] David Wood. Programming Internet email , 1999 .
[11] Dieter Gollmann,et al. Observations on Non-repudiation , 1996, ASIACRYPT.
[12] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[13] Kazuo Ohta,et al. How to simultaneously exchange secrets by general assumptions , 1994, CCS '94.