Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography
暂无分享,去创建一个
[1] Yvo Desmedt,et al. Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group , 1994, SIAM J. Discret. Math..
[2] V. Sidelnikov. Exponentiation-based key generation using noncommutative groups , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[3] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[4] Yvo Desmedt,et al. Perfect Zero-Knowledge Sharing Schemes over any Finite Abelian Group , 1993 .
[5] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[6] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[7] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[8] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[9] Ronald L. Graham,et al. Concrete mathematics - a foundation for computer science , 1991 .
[10] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[11] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[12] Martin Tompa,et al. Random self-reducibility and zero knowledge interactive proofs of possession of information , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[13] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[14] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[18] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[19] Burnham Sarle Walker. Introduction to computer engineering , 1967 .