-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
American Federation of Information Processing Societies Proceedings
-
G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference, 48, pages 313-317. American Federation of Information Processing Societies Proceedings, 1979.
-
(1979)
Proceedings of the National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
K. Nyberg, editor, Espoo, Finland, May. Springer-Verlag
-
M. Blaze, G. Bleumer, and M. Strauss. Divertible protocols and atomic proxy cryptography. In K. Nyberg, editor, Advances in Cryptology - Eurocrypt'98 (Lecture Notes in Computer Science 1403), pages 127-144, Espoo, Finland, May 1998. Springer-Verlag.
-
(1998)
Advances in Cryptology - Eurocrypt'98 (Lecture Notes in Computer Science)
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
0002181960
-
Digital multisignatures
-
H. Baker and F. Piper, editors, Clarendon Press
-
C. Boyd. Digital multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241-246. Clarendon Press, 1989.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
5
-
-
0035789226
-
Distributing trust on the Internet
-
Göteborg, Sweden, June 30-July 4. IEEE Computer Society Technical Committee on Fault-Tolerant Computing, IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance, IEEE Computer Society
-
C. Cachin. Distributing trust on the Internet. In Proceedings of International Conference on Dependable Systems and Networks (DSN-2001), pages 183-192, Göteborg, Sweden, June 30-July 4 2001. IEEE Computer Society Technical Committee on Fault-Tolerant Computing, IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance, IEEE Computer Society.
-
(2001)
Proceedings of International Conference on Dependable Systems and Networks (DSN-2001)
, pp. 183-192
-
-
Cachin, C.1
-
6
-
-
1142268846
-
An asynchronous protocol for distributed computation of RSA inverses and its applications
-
Boston, MA, USA, July. ACM
-
C. Cachin. An asynchronous protocol for distributed computation of RSA inverses and its applications. In Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC 2003), pages 153-162, Boston, MA, USA, July 2003. ACM.
-
(2003)
Proceedings of the Twenty-second ACM Symposium on Principles of Distributed Computing (PODC 2003)
, pp. 153-162
-
-
Cachin, C.1
-
8
-
-
0031619016
-
The random oracle methodology, revisited
-
ACM Press
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proceedings of the 30th annual ACM symposium on Theory of Computing, pages 209-218. ACM Press, 1998.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
10
-
-
85001025766
-
Wallet databases with observers
-
E. F. Brickell, editor Santa Barbara, CA USA, August. Springer-Verlag
-
D. Chaum and T. Pedersen. Wallet databases with observers. In E. F. Brickell, editor. Advances in Cryptology - Crypto '92 (Lecture Notes in Computer Science 576), pages 89-105, Santa Barbara, CA USA, August 1992. Springer-Verlag.
-
(1992)
Advances in Cryptology - Crypto '92 (Lecture Notes in Computer Science)
, vol.576
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
11
-
-
0003027707
-
Verifiable secret sharing and achieving simultaneous broadcast
-
B. Chor, S. Goldwasser, S. Macali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneous broadcast. In Proceedings of the 26th Symposium on Foundations of Computer Science, pages 335-344, 1985.
-
(1985)
Proceedings of the 26th Symposium on Foundations of Computer Science
, pp. 335-344
-
-
Chor, B.1
Goldwasser, S.2
Macali, S.3
Awerbuch, B.4
-
12
-
-
84945133720
-
Efficient and non-interactive non-malleable commitment
-
Springer-Verlag, May
-
G. D. Crescenzo, J. Katz, R. Ostrovsky, and A. Smith. Efficient and non-interactive non-malleable commitment. In Advances in Cryptology - Eurocrypt 2001 (Lecture Notes in Computer Science 2045, pages 40-59. Springer-Verlag, May 2001.
-
(2001)
Advances in Cryptology - Eurocrypt 2001 (Lecture Notes in Computer Science)
, vol.2045
, pp. 40-59
-
-
Crescenzo, G.D.1
Katz, J.2
Ostrovsky, R.3
Smith, A.4
-
13
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard, editor, Santa Barbara, California, U.S.A., August. Springer-Verlag
-
Y. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology - Crypto'89 (Lecture Notes in Computer Science 435), pages 307-315, Santa Barbara, California, U.S.A., August 1990. Springer-Verlag.
-
(1990)
Advances in Cryptology - Crypto'89 (Lecture Notes in Computer Science)
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
14
-
-
0038061165
-
Redistributing secret shares to new access structures and its applications
-
George Mason University, July
-
Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its applications. Technical Report ISSE-TR-97-01, George Mason University, July 1997.
-
(1997)
Technical Report
, vol.ISSE-TR-97-01
-
-
Desmedt, Y.1
Jajodia, S.2
-
15
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM Journal on Computing, 30(2):391-437, 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
16
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
18
-
-
0022045868
-
Impossibility of distributed consensus with one faulty processor
-
April
-
M. J. Fischer, N. A. Lynch, and M. S. Peterson. Impossibility of distributed consensus with one faulty processor. Journal of the ACM, 32(2):374-382, April 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Peterson, M.S.3
-
19
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
Miami Beach, FL USA, October 20-22. IEEE
-
Y. Frankel, P. Gemmel, P. MacKenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In Proceedings of the 38th Symposium on Foundations of Com puter Science, pages 384-393, Miami Beach, FL USA, October 20-22 1997. IEEE.
-
(1997)
Proceedings of the 38th Symposium on Foundations of Com Puter Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmel, P.2
MacKenzie, P.3
Yung, M.4
-
20
-
-
27944455141
-
Cryptosystems robust against "dynamic faults" meet enterprise needs for organizational "change control"
-
M. K. Franklin, editor, Anguilla, British West Indies, Feb. Springer-Verlag
-
Y. Frankel and M. Yung. Cryptosystems robust against "dynamic faults" meet enterprise needs for organizational "change control". In M. K. Franklin, editor, Proceedings of the Third International Conference on Financial Cryptography, FC'99 (Lecture Notes in Computer Science 1648), pages 241-252, Anguilla, British West Indies, Feb 1999. Springer-Verlag.
-
(1999)
Proceedings of the Third International Conference on Financial Cryptography, FC'99 (Lecture Notes in Computer Science)
, vol.1648
, pp. 241-252
-
-
Frankel, Y.1
Yung, M.2
-
21
-
-
84949189366
-
Secure distributed storage and retrieval
-
J. A. Garay, R. Gennaro, C. Jutla, and T. Rabin. Secure distributed storage and retrieval. In Proc. 11th International Workshop on Distributed Algorithms (WDAG'97), LNCS (1320), pages 275-289, 1997.
-
(1997)
Proc. 11th International Workshop on Distributed Algorithms (WDAG'97), LNCS
, vol.1320
, pp. 275-289
-
-
Garay, J.A.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
22
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
D. Coppersmith, editor, Santa Barbara, California, U.S.A., August. Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. In D. Coppersmith, editor, Advances in Cryptology - Crypto'95 (Lecture Notes in Computer Science 963), pages 457-469, Santa Barbara, California, U.S.A., August 1995. Springer-Verlag.
-
(1995)
Advances in Cryptology - Crypto'95 (Lecture Notes in Computer Science)
, vol.963
, pp. 457-469
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
23
-
-
84956869808
-
On quorum controlled asymmetric proxy re-encryption
-
H. Imai and Y. Zheng, editors, Public Key Cryptography, Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), Berlin, Germany. Springer-Verlag
-
M. Jakobsson. On quorum controlled asymmetric proxy re-encryption. In H. Imai and Y. Zheng, editors, Public Key Cryptography, Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), volume 1560 of Lecture Notes in Computer Science, pages 112-121, Berlin, Germany, 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1560
, pp. 112-121
-
-
Jakobsson, M.1
-
25
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382-401, 1982.
-
(1982)
ACM Trans. Program. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
26
-
-
0030687206
-
Proxy cryptosystem: Delegation of the power to decrypt ciphertexts
-
January
-
M. Mambo and E. Olamoto. Proxy cryptosystem: Delegation of the power to decrypt ciphertexts. IEICE TRANS. Fundamentals, E80-A(1):54-63, January 1997.
-
(1997)
IEICE TRANS. Fundamentals
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Olamoto, E.2
-
29
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. J. ACM, 27(2):228-234, 1980.
-
(1980)
J. ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
30
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum, editor, Santa Barbara, California, U.S.A., August. Springer-Verlag
-
T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor. Advances in Cryptology - Crypto'91 (Lecture Notes in Computer Science 576), pages 129-140, Santa Barbara, California, U.S.A., August 1992. Springer-Verlag.
-
(1992)
Advances in Cryptology - Crypto'91 (Lecture Notes in Computer Science)
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
31
-
-
0030126124
-
Distributing trust with the Rampart toolkit
-
April
-
M. K. Reiter. Distributing trust with the Rampart toolkit. Communications of the ACM, 39(4):71-74, April 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.4
, pp. 71-74
-
-
Reiter, M.K.1
-
32
-
-
0030376048
-
The Ω key management service
-
M. K. Reiter, M. K. Franklin, J. B. Lacy, and R. N. Wright. The Ω key management service. Journal of Computer Security, 4(4):267-297, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.4
, pp. 267-297
-
-
Reiter, M.K.1
Franklin, M.K.2
Lacy, J.B.3
Wright, R.N.4
-
33
-
-
26044481272
-
Distributed trust: Supporting fault-tolerance and attack-tolerance
-
Computer Science Department, Cornell University, Ithaca, NY USA, January
-
F. B. Schneider and L. Zhou. Distributed trust: Supporting fault-tolerance and attack-tolerance. Technical Report TR 2004-1924, Computer Science Department, Cornell University, Ithaca, NY USA, January 2004.
-
(2004)
Technical Report
, vol.TR 2004-1924
-
-
Schneider, F.B.1
Zhou, L.2
-
34
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
12344290414
-
Distributed blinding for ElGamal re-encryption
-
Cornell University, January
-
L. Zhou, M. A. Marsh, F. B. Schneider, and A. Redz. Distributed blinding for ElGamal re-encryption. Technical Report TR 2004-1920, Cornell University, January 2004.
-
(2004)
Technical Report
, vol.TR 2004-1920
-
-
Zhou, L.1
Marsh, M.A.2
Schneider, F.B.3
Redz, A.4
-
37
-
-
0345757359
-
COCA: A secure distributed on-line certification authority
-
November
-
L. Zhou, F. B. Schneider, and R. van Renesse. COCA: A secure distributed on-line certification authority. ACM Transactions on Computer Systems, 20(4):329-368, November 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|