-
1
-
-
17244362322
-
-
Mansuscript
-
R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive Security for Threshold Cryptosystems. Mansuscript, 1999.
-
(1999)
Adaptive Security for Threshold Cryptosystems
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
3
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Trans. Fundamentals, E76A(4):532-545, 1993.
-
(1993)
IEICE Trans. Fundamentals, E76A
, Issue.4
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
5
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Info. Theory, IT 31:469-472, 1985.
-
(1985)
IEEE Trans. Info. Theory, IT
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
6
-
-
0023538330
-
A Practical Scheme for Non-Interactive Veriffiable Secret Sharing
-
P. Feldman. A Practical Scheme for Non-Interactive Veriffiable Secret Sharing. In Proc. 28th FOCS, pages 427-437.
-
In Proc. 28Th FOCS
, pp. 427-437
-
-
Feldman, P.1
-
7
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
IEEE
-
Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In Proc. 38th FOCS, pages 384-393. IEEE, 1997.
-
(1997)
Proc. 38Th FOCS
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
8
-
-
84947926543
-
Robust threshold DSS signatures
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Advances in Cryptology - Eurocrypt '96, pages 354-371. LNCS No. 1070.
-
Advances in Cryptology - Eurocrypt '96
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
10
-
-
0028508211
-
Group oriented (T; n) digital signature scheme
-
Sept
-
L. Harn. Group oriented (t; n) digital signature scheme. IEE Proc Comput.Digit.Tech, 141(5):307-313, Sept 1994.
-
(1994)
IEE Proc Comput.Digit.Tech
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
11
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public key and signature systems. In 1997 ACM Conference on Com- puters and Communication Security, 1997.
-
(1997)
1997 ACM Conference on Com- Puters and Communication Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
12
-
-
84957626176
-
Proactive secret sharing, or: How to cope with perpetual leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In Advances in Cryptology | Crypto '95, pages 339-352. LNCS No. 963.
-
In Advances in Cryptology | Crypto '95
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
14
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
T. Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology -Eurocrypt '91, pages 522-526. LNCS No. 547.
-
In Advances in Cryptology -Eurocrypt '91
, vol.547
, pp. 522-526
-
-
Pedersen, T.1
-
15
-
-
84982943258
-
Non-interactive and information-theoretic secure veriffiable secret sharing
-
T. Pedersen. Non-interactive and information-theoretic secure veriffiable secret sharing. In Advances in Cryptology - Crypto '91, pages 129-140. LNCS No. 576.
-
In Advances in Cryptology - Crypto '91
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
16
-
-
0029769836
-
New ElGamal Type Threshold Digital Signature Scheme
-
C. Park and K. Kurosawa. New ElGamal Type Threshold Digital Signature Scheme. IEICE Trans. Fundamentals, E79-A(1):86-93, January 1996.
-
(1996)
IEICE Trans. Fundamentals, E79-A
, vol.January
, Issue.1
, pp. 86-93
-
-
Park, C.1
Kurosawa, K.2
-
17
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
18
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. In Advances in Cryptology- Eurocrypt '98, pages 1-16. LNCS No. 1403.
-
Advances in Cryptology- Eurocrypt '98
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
|