-
1
-
-
0018545449
-
How to share a secret
-
Shamir, A.: 'How to share a secret', Commun. ACM, 1979, 22, (11), pp. 612-613
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
77958582062
-
Strong (n, t, n) verifiable secret sharing scheme
-
Harn, L., Lin, C.: 'Strong (n, t, n) verifiable secret sharing scheme', Inf. Sci., 2010, 180, (16), pp. 3059-3064
-
(2010)
Inf. Sci.
, vol.180
, Issue.16
, pp. 3059-3064
-
-
Harn, L.1
Lin, C.2
-
5
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
(LNCS, 576)
-
Pedersen, T.P.: 'Non-interactive and information-theoretic secure verifiable secret sharing'. Proc. CRYPTO'92, 1992 (LNCS, 576), pp. 129-140
-
(1992)
Proc. CRYPTO'92
, pp. 129-140
-
-
Pedersen, T.P.1
-
6
-
-
84957685616
-
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
-
(LNCS, 1403)
-
Fujisaki, E., Okamoto, T.: 'A practical and provably secure scheme for publicly verifiable secret sharing and its applications'. Proc. EUROCRYPT'98, 1998 (LNCS, 1403), pp. 32-46
-
(1998)
Proc. EUROCRYPT'98
, pp. 32-46
-
-
Fujisaki, E.1
Okamoto, T.2
-
8
-
-
79956316924
-
Apractical (non-interactive) publicly verifiable secret sharing scheme
-
(LNCS, 6672)
-
Jhanwar, M.:'Apractical (non-interactive) publicly verifiable secret sharing scheme'. Proc. ISPEC2011, 2011 (LNCS, 6672), pp. 273-287
-
(2011)
Proc. ISPEC2011
, pp. 273-287
-
-
Jhanwar, M.1
-
9
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic voting
-
(LNCS, 1666)
-
Schoenmakers, B.: 'A simple publicly verifiable secret sharing scheme and its application to electronic voting'. Proc. CRYPTO'99, 1999 (LNCS, 1666), pp. 148-164
-
(1999)
Proc. CRYPTO'99
, pp. 148-164
-
-
Schoenmakers, B.1
-
10
-
-
84947917119
-
Public verifiable secret sharing
-
(LNCS, 1070)
-
Stadler, M.: 'Public verifiable secret sharing'. Proc. EUROCRYPT'96, 1996 (LNCS, 1070), pp. 190-199
-
(1996)
Proc. EUROCRYPT'96
, pp. 190-199
-
-
Stadler, M.1
-
11
-
-
84858245424
-
Publicly verifiable secret sharing schemes using bilinear pairings
-
Tian, Y., Peng, C., Ma, J.: 'Publicly verifiable secret sharing schemes using bilinear pairings', Int. J. Netw. Sec., 2012, 14, (3), pp. 142-148
-
(2012)
Int. J. Netw. Sec.
, vol.14
, Issue.3
, pp. 142-148
-
-
Tian, Y.1
Peng, C.2
Ma, J.3
-
12
-
-
79551705094
-
A pairing-based publicly verifiable secret sharing scheme
-
Wu, T.Y., Tseng, Y.M.: 'A pairing-based publicly verifiable secret sharing scheme', J. Syst. Sci. Complexity, 2011, 24, (1), pp. 186-194
-
(2011)
J. Syst. Sci. Complexity
, vol.24
, Issue.1
, pp. 186-194
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
15
-
-
0029714307
-
An efficient fair payment system
-
Camenisch, J., Piveteau, J.M., Stadler, M.: 'An efficient fair payment system'. Proc. Third ACM Conf. Computer and Communications Security, 1996, pp. 88-94
-
(1996)
Proc. Third ACM Conf. Computer and Communications Security
, pp. 88-94
-
-
Camenisch, J.1
Piveteau, J.M.2
Stadler, M.3
-
17
-
-
84957629646
-
Fair blind signatures
-
(LNCS, 921)
-
Stadler, M., Piveteau, J.M., Camenisch, J.: 'Fair blind signatures'. Proc. EUROCRYPT'95, 1995 (LNCS, 921), pp. 209-219
-
(1995)
Proc. EUROCRYPT'95
, pp. 209-219
-
-
Stadler, M.1
Piveteau, J.M.2
Camenisch, J.3
-
18
-
-
0034504833
-
A practical (t, n) multi-secret sharing scheme
-
Chien, H.Y., Jan, J.K., Tseng, Y.M.: 'A practical (t, n) multi-secret sharing scheme', IEICE Trans. Fundam., 2000, E83-A, (12), pp. 2762-2765
-
(2000)
IEICE Trans. Fundam.
, vol.E83-A
, Issue.12
, pp. 2762-2765
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
19
-
-
0028498073
-
Multi secret-sharing scheme based on one-way function
-
He, J., Dawson, E.: 'Multi secret-sharing scheme based on one-way function', Electron. Lett., 1995, 30, (19), pp. 1591-1592
-
(1995)
Electron. Lett.
, vol.30
, Issue.19
, pp. 1591-1592
-
-
He, J.1
Dawson, E.2
-
20
-
-
1542402281
-
A (t, n) multi-secret sharing scheme
-
Yang, C.C., Chang, T.Y., Hwang, M.S.: 'A (t, n) multi-secret sharing scheme', Appl. Math. Comput., 2004, 151, (2), pp. 483-490
-
(2004)
Appl. Math. Comput.
, vol.151
, Issue.2
, pp. 483-490
-
-
Yang, C.C.1
Chang, T.Y.2
Hwang, M.S.3
-
21
-
-
78049242904
-
A verifiable multi-secret sharing scheme based on cellular automata
-
Eslami, Z., Ahmadabadi, J.: 'A verifiable multi-secret sharing scheme based on cellular automata', Inf. Sci., 2010, 180, (15), pp. 2889-2894
-
(2010)
Inf. Sci.
, vol.180
, Issue.15
, pp. 2889-2894
-
-
Eslami, Z.1
Ahmadabadi, J.2
-
22
-
-
25644460988
-
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
-
Shao, J., Cao, Z.: 'A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme', Appl. Math. Comput., 2005, 168, (1), pp. 135-140
-
(2005)
Appl. Math. Comput.
, vol.168
, Issue.1
, pp. 135-140
-
-
Shao, J.1
Cao, Z.2
-
23
-
-
33751101633
-
A practical verifiable multi-secret sharing scheme
-
Zhao, J., Zhang, J., Zhao, R.: 'A practical verifiable multi-secret sharing scheme', Comput. Stand. and Interfaces, 2007, 29, (1), pp. 138-141
-
(2007)
Comput. Stand. and Interfaces
, vol.29
, Issue.1
, pp. 138-141
-
-
Zhao, J.1
Zhang, J.2
Zhao, R.3
-
24
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes, A., Okamoto, T., Vanstone, S.: 'Reducing elliptic curve logarithms to logarithms in a finite field', IEEE Trans. Inf. Theory, 1993, 39, (5), pp. 1639-1646
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
25
-
-
23944461491
-
A one round protocol for tripartite diffie-hellman
-
Joux, A.: 'A one round protocol for tripartite Diffie-Hellman', J. Cryptol., 2004, 17, (4), pp. 263-276
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
26
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D., Franklin, M.: 'Identity-based encryption from the Weil pairing', SIAM J. Comput., 2003, 32, (3), pp. 586-615
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
27
-
-
23044435711
-
Short signature from the weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: 'Short signature from the Weil pairing', J. Cryptol., 2004, 17, (4), pp. 297-319
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
28
-
-
84946832010
-
Supersingular curves in cryptography
-
(LNCS, 2248)
-
Galbraith, S.D.: 'Supersingular curves in cryptography'. Proc. ASIACRYPT, 2001 (LNCS, 2248), pp. 495-513
-
(2001)
Proc. ASIACRYPT
, pp. 495-513
-
-
Galbraith, S.D.1
-
29
-
-
84937426999
-
Supersingular abelian varieties in cryptology
-
(LNCS, 2442)
-
Rubin, K., Silverberg, A.: 'Supersingular abelian varieties in cryptology'. Proc. CRYPTO'02, 2002 (LNCS, 2442), pp. 336-353
-
(2002)
Proc. CRYPTO'02
, pp. 336-353
-
-
Rubin, K.1
Silverberg, A.2
-
30
-
-
35248844436
-
An identity-based signature from gap diffie-hellman groups
-
(LNCS, 2567)
-
Cha, J.C., Cheon, J.H.: 'An identity-based signature from gap Diffie-Hellman groups'. Proc. 6th Int. Workshop on Theory and Practice in Public Key Cryptography, 2002 (LNCS, 2567), pp. 18-30
-
(2002)
Proc. 6th Int. Workshop on Theory and Practice in Public Key Cryptography
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
31
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
Chen, L., Cheng, Z., Smart, N.P.: 'Identity-based key agreement protocols from pairings', Int. J. Inf. Secur., 2007, 6, (4), pp. 213-241
-
(2007)
Int. J. Inf. Secur.
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
32
-
-
71149103376
-
An efficient and provably secure ID-based signature scheme with batch verifications
-
Tseng, Y.M., Wu, T.Y., Wu, J.D.: 'An efficient and provably secure ID-based signature scheme with batch verifications', Int. J. Innov. Comput. Inf. Control, 2009, 5, (11), pp. 3911-3922
-
(2009)
Int. J. Innov. Comput. Inf. Control
, vol.5
, Issue.11
, pp. 3911-3922
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
33
-
-
77955703761
-
An ID-based mutual authentication and key exchange protocol for low-power mobile devices
-
Wu, T.Y., Tseng, Y.M.: 'An ID-based mutual authentication and key exchange protocol for low-power mobile devices', Comput. J., 2010, 53, (7), pp. 1062-1070
-
(2010)
Comput. J.
, vol.53
, Issue.7
, pp. 1062-1070
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
34
-
-
77955659710
-
An efficient user authentication and key exchange protocol for mobile client-server environment
-
Wu, T.Y., Tseng, Y.M.: 'An efficient user authentication and key exchange protocol for mobile client-server environment', Comput. Netw., 2010, 54, (9), pp. 1520-1530
-
(2010)
Comput. Netw.
, vol.54
, Issue.9
, pp. 1520-1530
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
35
-
-
84863621901
-
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
-
Wu, T.Y., Tseng, Y.M., Tsai, T.T.: 'A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants', Comput. Netw., 2012, 56, pp. 2994-3006
-
(2012)
Comput. Netw.
, vol.56
, pp. 2994-3006
-
-
Wu, T.Y.1
Tseng, Y.M.2
Tsai, T.T.3
-
36
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
(LNCS, 2947)
-
Zhang, F., Safavi-Naini, R., Susilo, W.: 'An efficient signature scheme from bilinear pairings and its applications'. Proc. Public Key Cryptography (PKC 2004), 2004 (LNCS, 2947), pp. 277-290
-
(2004)
Proc. Public Key Cryptography (PKC 2004)
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
38
-
-
25844432081
-
A robust multi-party key agreement protocol resistant to malicious participants
-
Tseng, Y.M.: 'A robust multi-party key agreement protocol resistant to malicious participants', Comput. J., 2005, 48, (4), pp. 480-487
-
(2005)
Comput. J.
, vol.48
, Issue.4
, pp. 480-487
-
-
Tseng, Y.M.1
-
39
-
-
84873031582
-
An efficient key-management scheme for hierarchical access control in e-medicine system
-
Wu, S., Chen, K.: 'An efficient key-management scheme for hierarchical access control in e-medicine system', J. Med. Syst., 2012, 36, pp. 2325-2337
-
(2012)
J. Med. Syst.
, vol.36
, pp. 2325-2337
-
-
Wu, S.1
Chen, K.2
|