-
3
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
IEEE Press
-
P. Feldman. A practical scheme for non-interactive verifiable secret sharing. Proceedings of FOCS'87, IEEE Press, pp. 427-437 (1987).
-
(1987)
Proceedings of FOCS'87
, pp. 427-437
-
-
Feldman, P.1
-
4
-
-
84937439482
-
One round threshold discrete-log key generation without private channels
-
Proceedings of PKC'01, Springer-Verlag
-
P.A. Fouque and J. Stern. One round threshold discrete-log key generation without private channels. Proceedings of PKC'01, LNCS 1992, Springer-Verlag, pp. 190-206 (2001).
-
(2001)
LNCS
, vol.1992
, pp. 190-206
-
-
Fouque, P.A.1
Stern, J.2
-
5
-
-
84947926543
-
Robust threshold DSS signatures
-
Advances in Cryptology-Eurocrypt'96, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Robust threshold DSS signatures. Advances in Cryptology-Eurocrypt'96, LNCS 1070, Springer-Verlag, pp. 354-371 (1996).
-
(1996)
LNCS
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
6
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
Advances in Cryptology-Eurocrypt'99, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. Advances in Cryptology-Eurocrypt'99, LNCS 1592, Springer-Verlag, pp. 295-310 (1999).
-
(1999)
LNCS
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
7
-
-
0030693496
-
Complete characterization of adversaries tolerable in secure multi-party computation
-
M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation. Proceedings of PODC'97, pp. 25-34 (1997).
-
(1997)
Proceedings of PODC'97
, pp. 25-34
-
-
Hirt, M.1
Maurer, U.2
-
8
-
-
0141518230
-
A secure nonrepudiable threshold proxy signature scheme with known signers
-
M. Hwang, I. Lin and E.J. Lu. A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica, vol. 11, no. 2, pp. 1-8, (2000).
-
(2000)
International Journal of Informatica
, vol.11
, Issue.2
, pp. 1-8
-
-
Hwang, M.1
Lin, I.2
Lu, E.J.3
-
10
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim and K. Kim. Strong proxy signature and its applications. Proceedings of SCIS'01, Vol. 2/2, pp. 603-608 (2001).
-
(2001)
Proceedings of SCIS'01
, vol.2
, Issue.2
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
11
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda and E. Okamoto. Proxy signatures: Delegation of the power to sign messages. IEICE Transactions Fundamentals, Vol. E79-A, No. 9, pp. 1338-1353 (1996).
-
(1996)
IEICE Transactions Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
12
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Advances in Cryptoplogy-Crypto'91, Springer-Verlag
-
T.P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptoplogy-Crypto'91, LNCS 576, Springer-Verlag, pp. 129-140 (1991).
-
(1991)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
13
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Springer-Verlag
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, Vol. 13, Num. 3, Springer-Verlag, pp. 361-396 (2000).
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
14
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, Vol. 4, pp. 161-174 (1991).
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
15
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its applications to electronic voting
-
Advances in Cryptology-Crypto'99, Springer-Verlag
-
B. Schoenmakers. A simple publicly verifiable secret sharing scheme and its applications to electronic voting. Advances in Cryptology-Crypto'99, LNCS 1666, Springer-Verlag, pp. 148-164 (1999).
-
(1999)
LNCS
, vol.1666
, pp. 148-164
-
-
Schoenmakers, B.1
-
16
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, No. 22, pp. 612-613 (1979).
-
(1979)
Communications of the ACM
, Issue.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
0037435795
-
Proxy signature schemes based on factoring
-
Z. Shao. Proxy signature schemes based on factoring. Information Processing Letters, No. 85, pp. 137-143 (2003).
-
(2003)
Information Processing Letters
, Issue.85
, pp. 137-143
-
-
Shao, Z.1
-
18
-
-
84948954277
-
Practical Threshold Signatures
-
Advances in Cryptology-Eurocrypt'00, Springer-Verlag
-
V. Shoup. Practical Threshold Signatures. Advances in Cryptology-Eurocrypt'00, LNCS 1807, Springer-Verlag, pp. 207-220 (2000).
-
(2000)
LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
20
-
-
84958772823
-
Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates
-
Proceedings ACISP'01, Springer-Verlag
-
D.R. Stinson and R. Strobl. Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates. Proceedings ACISP'01, LNCS 2119, Springer-Verlag, pp. 417-434, (2001).
-
(2001)
LNCS
, vol.2119
, pp. 417-434
-
-
Stinson, D.R.1
Strobl, R.2
|