Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography

[1]  Yvo Desmedt,et al.  Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group , 1994, SIAM J. Discret. Math..

[2]  V. Sidelnikov Exponentiation-based key generation using noncommutative groups , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[3]  Moti Yung,et al.  How to share a function securely , 1994, STOC '94.

[4]  Yvo Desmedt,et al.  Perfect Zero-Knowledge Sharing Schemes over any Finite Abelian Group , 1993 .

[5]  Mihir Bellare,et al.  On Defining Proofs of Knowledge , 1992, CRYPTO.

[6]  Yvo Desmedt,et al.  Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.

[7]  Silvio Micali,et al.  Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.

[8]  Torben P. Pedersen Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.

[9]  Ronald L. Graham,et al.  Concrete mathematics - a foundation for computer science , 1991 .

[10]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[11]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.

[12]  Martin Tompa,et al.  Random self-reducibility and zero knowledge interactive proofs of possession of information , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[13]  David Chaum,et al.  An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.

[14]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[17]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[18]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[19]  Burnham Sarle Walker Introduction to computer engineering , 1967 .