(t+1,n) threshold and generalized DSS signatures without a trusted party
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Narn-Yih Lee,et al. Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders , 1994, EUROCRYPT.
[3] Chi-Sung Laih,et al. Generalized Threshold Cryptosystems , 1991, ASIACRYPT.
[4] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[5] Susan K. Langford. Threshold DSS Signatures without a Trusted Party , 1995, CRYPTO.
[6] Thomas Hardjono,et al. A Practical Digital Multisignature Scheme Based on Discrete Logarithms , 1992, AUSCRYPT.
[7] Susan K. Langford. Weakness in Some Threshold Cryptosystems , 1996, CRYPTO.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[10] Gustavus J. Simmons,et al. A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.
[11] Keith M. Martin,et al. Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract) , 1995, EUROCRYPT.
[12] L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature , 1994 .
[13] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[14] Tzonelih Hwang,et al. Conspiracy Attacks on the Threshold RSA Signature Scheme , 1994, Cryptologia.
[15] CORPORATE NIST. The digital signature standard , 1992, CACM.
[16] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.