Establishing identity without certification authorities
暂无分享,去创建一个
[1] Steven M. Bellovin,et al. An attack on the Interlock Protocol when used for authentication , 1994, IEEE Trans. Inf. Theory.
[2] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[3] Adi Shamir,et al. How to expose an eavesdropper , 1984, CACM.