-
1
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Santa Barbara, August
-
Y. Desmedt, Society and group oriented cryptography: a new concept, in: Advances in Cryptology, Proceedings of Crypto '87, Santa Barbara, August 1988, pp. 120-127.
-
(1988)
Advances in Cryptology, Proceedings of Crypto '87
, pp. 120-127
-
-
Desmedt, Y.1
-
2
-
-
85023809951
-
Threshold cryptosystem
-
Santa Barbara, August
-
Y. Desmedt, Y. Frankel, Threshold cryptosystem, in: Advances in Cryptology, Proceedings of Crypto '89, Santa Barbara, August 1989, pp. 307-315.
-
(1989)
Advances in Cryptology, Proceedings of Crypto '89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
3
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Houlthalen, Belgium, April
-
Y. Frankel, A practical protocol for large group oriented networks, in: Advances in Cryptology, Proceedings of Eurocrypt '89, Houlthalen, Belgium, April 1989, pp. 56-61.
-
(1989)
Advances in Cryptology, Proceedings of Eurocrypt '89
, pp. 56-61
-
-
Frankel, Y.1
-
4
-
-
84979090055
-
Cryptosystem for group oriented cryptography
-
Springer-Verlag, Berlin
-
T. Hwang, Cryptosystem for group oriented cryptography, Lecture Notes in Computer Science, vol. 473, Springer-Verlag, Berlin, 1990, pp. 352-360.
-
(1990)
Lecture Notes in Computer Science
, vol.473
, pp. 352-360
-
-
Hwang, T.1
-
5
-
-
0027614601
-
A new generalized group-oriented cryptoscheme without trusted centers
-
C.C. Chang, H.C. Lee, A new generalized group-oriented cryptoscheme without trusted centers, IEEE Journal on Selected Areas in Communications 11 (5) (1993) 725-729.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 725-729
-
-
Chang, C.C.1
Lee, H.C.2
-
6
-
-
84921169347
-
A protocol to set up shared secret schemes without the assistance of a mutually trusted party
-
Springer-Verlag, Berlin
-
I. Ingemarsson, G.J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutually trusted party, Lecture Notes in Computer Science, vol. 473, Springer-Verlag, Berlin, 1990, pp. 266-282.
-
(1990)
Lecture Notes in Computer Science
, vol.473
, pp. 266-282
-
-
Ingemarsson, I.1
Simmons, G.J.2
-
7
-
-
0345121672
-
Generalized threshold cryptosystem
-
Fujiyoshida, Japan, November
-
C.S. Laih, L. Harn, Generalized threshold cryptosystem, in: Advances in Cryptology, Proceedings of Asiacrypt '91, Fujiyoshida, Japan, November 1991, pp. 88-92.
-
(1991)
Advances in Cryptology, Proceedings of Asiacrypt '91
, pp. 88-92
-
-
Laih, C.S.1
Harn, L.2
-
8
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Brighton, UK, April
-
T.P. Pedersen, A threshold cryptosystem without a trusted party, in: Advances in Cryptology, Proceedings of Eurocrypt '91, Brighton, UK, April 1991, pp. 522-526.
-
(1991)
Advances in Cryptology, Proceedings of Eurocrypt '91
, pp. 522-526
-
-
Pedersen, T.P.1
-
9
-
-
85024290278
-
Group signature
-
Brighton, UK, April
-
D. Chaum, E. van Heyst, Group signature, in: Advances in Cryptology, Proceedings of Eurocrypt '91, Brighton, UK, April 1991, pp. 257-265.
-
(1991)
Advances in Cryptology, Proceedings of Eurocrypt '91
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
10
-
-
0000266745
-
Shared generation of authenticators
-
Santa Barbara, August
-
Y. Desmedt, Y. Frankel, Shared generation of authenticators, in: Advances in Cryptology, Proceedings of Crypto '91, Santa Barbara, August 1991, pp. 457-469.
-
(1991)
Advances in Cryptology, Proceedings of Crypto '91
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R.L. Rivest, A. Shamir, L. Addleman, A method for obtaining digital signatures and public-key cryptosystem, Comm. ACM 21 (2) (1978) 120-126.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Addleman, L.3
-
12
-
-
0028508211
-
Group-oriented (t,n) threshold signature and digital multi-signature
-
L. Harn, Group-oriented (t,n) threshold signature and digital multi-signature, IEE Proceedings of Computers and Digital Techniques 141 (5) (1994) 307-313.
-
(1994)
IEE Proceedings of Computers and Digital Techniques
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
13
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM 22 (1979) 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
0347355738
-
(t,n) Threshold signature schemes based on discrete logarithm
-
Springer-Verlag
-
C.M. Li, T. Hwang, N.Y. Lee, (t,n) Threshold signature schemes based on discrete logarithm, in: Advances in Cryptology, Proceedings of Eurocrypt '94, Springer-Verlag, 1995, pp. 191-200.
-
(1995)
Advances in Cryptology, Proceedings of Eurocrypt '94
, pp. 191-200
-
-
Li, C.M.1
Hwang, T.2
Lee, N.Y.3
-
15
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. on Information Theory IT-31 (1985) 469-472.
-
(1985)
IEEE Trans. on Information Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
16
-
-
0025700831
-
Improved digital signature scheme based on discrete exponentiation
-
G.B. Agnew, R.C. Mullin, S.A. Vanstone, Improved digital signature scheme based on discrete exponentiation, Electronics Letters 26 (14) (1990) 1024-1025.
-
(1990)
Electronics Letters
, vol.26
, Issue.14
, pp. 1024-1025
-
-
Agnew, G.B.1
Mullin, R.C.2
Vanstone, S.A.3
-
18
-
-
17444431787
-
Group-oriented undeniable signature schemes without the assistance of a mutually trusted party
-
Springer-Verlag
-
L. Harn, S. Yang, Group-oriented undeniable signature schemes without the assistance of a mutually trusted party, in: Advances in Cryptology, Proceedings of Auscrypt '92, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology, Proceedings of Auscrypt '92
-
-
Harn, L.1
Yang, S.2
|