-
2
-
-
0011960231
-
Partial key escrow: A new approach to software key escrow
-
Washington
-
Shamir A. Partial key escrow: A new approach to software key escrow. In: Proceedings of the Key Escrow Conference. Washington, 1995.
-
(1995)
Proceedings of the Key Escrow Conference
-
-
Shamir, A.1
-
3
-
-
84947439162
-
A key escrow system with warrant bound
-
Coppersmith D.(ed.), LNCS 963, Berlin: Springer-Vrelag
-
Lenstra AK, Winkler P, Yacobi Y. A key escrow system with warrant bound. In: Coppersmith D, ed. Proceedings of the Crypto'95. LNCS 963, Berlin: Springer-Vrelag, 1995. 197-207.
-
(1995)
Proceedings of the Crypto.'95
, pp. 197-207
-
-
Lenstra, A.K.1
Winkler, P.2
Yacobi, Y.3
-
4
-
-
0041591168
-
Fair cryptosystems
-
Technique Report, MIT/LCS/TR-579.c, Cambridge: Massachusetts Institute of Technology
-
Micali S. Fair cryptosystems. Technique Report, MIT/LCS/TR-579.c, Cambridge: Massachusetts Institute of Technology, 1994.
-
(1994)
-
-
Micali, S.1
-
5
-
-
84957658795
-
A simple method for generating and sharing pseudo-random functions with application to clipper-like key escrow system
-
Coppersmith D.(ed.), LNCS 963, Berlin: Springer-Verlag
-
Micali S, Ney R. A simple method for generating and sharing pseudo-random functions with application to clipper-like key escrow system. In: Coppersmith D, ed. Proceedings of the Crypto'95. LNCS 963, Berlin: Springer-Verlag, 1995. 184-196.
-
(1995)
Proceedings of the Crypto.'95
, pp. 184-196
-
-
Micali, S.1
Ney, R.2
-
6
-
-
0032258223
-
A new secret sharing threshold scheme and key escrow system
-
Chinese source
-
Yang Bo, Ma WP, Wang, YM. A new secret sharing threshold scheme and key escrow system. Acta Electronica Sinica, 1998, 26(10): 1-3 (in Chinese with English abstract).
-
(1998)
Acta Electronica Sinica
, vol.26
, Issue.10
, pp. 1-3
-
-
Yang, B.1
Ma, W.P.2
Wang, Y.M.3
-
7
-
-
0030270929
-
A public-key-based key escrow system
-
Nechvatal J. A public-key-based key escrow system. Journal of Systems Software, 1996, 35(1): 73-83.
-
(1996)
Journal of Systems Software
, vol.35
, Issue.1
, pp. 73-83
-
-
Nechvatal, J.1
-
8
-
-
9744287313
-
Description of key escrow system
-
Denning DE. Description of key escrow system. 1997. http://www.cs.georgetown.edu/-denning/crypto/Appendix.html/.
-
(1997)
-
-
Denning, D.E.1
-
9
-
-
85023809951
-
Threshold cryptosystems
-
Brassard G.(ed.), LNCS 435, Berlin: Springer-Verlag
-
Desmedt Y, Frankel Y. Threshold cryptosystems. In: Brassard G, ed. Proceedings of the Crypto'89. LNCS 435, Berlin: Springer-Verlag, 1990. 307-315.
-
(1990)
Proceedings of the Crypto.'89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
10
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Feigenbaum J.(ed.), LNCS 576, Berlin: Springer-Verlag
-
Desmedt Y, Frankel Y. Shared generation of authenticators and signatures. In: Feigenbaum J, ed. Proceedings of the Crypto'91. LNCS 576, Berlin: Springer-Verlag, 1992. 457-469.
-
(1992)
Proceedings of the Crypto.'91
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
12
-
-
84947441722
-
Robust arid efficient sharing of RSA functions
-
Koblitz N.(ed.), LNCS 1109, Berlin: Springer-Verlag
-
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust arid efficient sharing of RSA functions. In: Koblitz N, ed. Proceedings of the Crypto'96. LNCS 1109, Berlin: Springer-Verlag, 1996. 157-172.
-
(1996)
Proceedings of the Crypto.'96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
0035416443
-
A threshold key escrow scheme based on public key cryptosystem
-
Chinese source
-
Cao ZF, A threshold key escrow scheme based on public key cryptosystem. Science in China (Series E), 2001, 44(4): 441-448 (in Chinese with English abstract).
-
(2001)
Science in China (Series E)
, vol.44
, Issue.4
, pp. 441-448
-
-
Cao, Z.F.1
-
14
-
-
0036554764
-
A threshold key escrow scheme based on ElGamal cryptosystem
-
Chinese source
-
Cao ZF, Li JG. A threshold key escrow scheme based on ElGamal cryptosystem. Chinese Journal of Computers, 2002, 25(4): 346-350 (in Chinese with English abstract).
-
(2002)
Chinese Journal of Computers
, vol.25
, Issue.4
, pp. 346-350
-
-
Cao, Z.F.1
Li, J.G.2
-
15
-
-
0034309495
-
Weaknesses of some threshold group signature schemes
-
Chinese source
-
Wang GL, Qing SH. Weaknesses of some threshold group signature schemes. Journal of Software, 2000, 11(10): 1326-1332 (in Chinese with English abstract).
-
(2000)
Journal of Software
, vol.11
, Issue.10
, pp. 1326-1332
-
-
Wang, G.L.1
Qing, S.H.2
-
16
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
Cerecedo M, Matsumoto T, Imai H. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Transactions on Fundamentals, 1993, E76-A(4): 532-545.
-
(1993)
IEICE Transactions on Fundamentals
, vol.E76-A
, Issue.4
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
18
-
-
84947926543
-
Robust threshold DSS signatures
-
Maurer U.(ed.), LNCS 1070, Springer-Verlag
-
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust threshold DSS signatures. In: Maurer U, ed. Advances in Cryptology-Eurocrypt'96. LNCS 1070, Springer-Verlag, 1996. 354-371.
-
(1996)
Advances in Cryptology-Eurocrypt'96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
19
-
-
0141595582
-
-
Chinese source, Harbin: Heilongjiang Education Press
-
Cao ZF. Public Key Cryptology. Harbin: Heilongjiang Education Press, 1993. 158-185 (in Chinese).
-
(1993)
Public Key Cryptology
, pp. 158-185
-
-
Cao, Z.F.1
-
20
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 1978, 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithm
-
ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
|