Threshold Cryptosystems
暂无分享,去创建一个
[1] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Tzonelih Hwang,et al. Cryptosystem for Group Oriented Cryptography , 1991, EUROCRYPT.
[4] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[5] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[6] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[9] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[10] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[11] Yair Frankel,et al. A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.
[12] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[13] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[14] Ian F. Blake,et al. Complexity Issues for Public Key Cryptography , 1988 .
[15] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[16] Jean-Jacques Quisquater,et al. A Signature with Shared Verification Scheme , 1989, CRYPTO.
[17] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[18] Tatsuaki Okamoto,et al. A digital multisignature scheme using bijective public-key cryptosystems , 1988, TOCS.
[19] S. Vanstone,et al. Computing Logarithms in Finite Fields of Characteristic Two , 1984 .
[20] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[21] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[22] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[23] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[24] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[25] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[26] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[27] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[28] Andrew M. Odlyzko,et al. Discrete Logarithms in Finite Fields and Their Cryptographic Significance , 1985, EUROCRYPT.