-
1
-
-
84947770625
-
Verifiable secret shar-ing
-
Eficient dynamic-resharing, LNCS 979
-
N. Alon, Z. Galil and M. Yung, Eficient dynamic-resharing “verifiable secret shar-ing" against mobile adversary, European Symposium on Algorithms (ESA) 95, LNCS 979, 523-537.
-
Against Mobile Adversary, European Symposium on Algorithms (ESA) 95
, pp. 523-537
-
-
Alon, N.1
Galil, Z.2
Yung, M.3
-
2
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret, Advances
-
LNCS 263
-
J. C. Benaloh, Secret sharing homomorphisms: keeping shares of a secret secret, Advances in Cryptology-Crypto'86, LNCS 263, 1987, 251-260.
-
(1987)
Cryptology-Crypto'86
, pp. 251-260
-
-
Benaloh, J.C.1
-
3
-
-
84898960610
-
Completeness Theorems for Non-cryptographic Fault-Tolerant Distributed Computations
-
M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness Theorems for Non-cryptographic Fault-Tolerant Distributed Computations, Proc. 20th Annual Symp. on the Theory of Computing, ACM, 1988, 1-10.
-
(1988)
Proc 20Th Annual Symp on the Theory of Computing, ACM
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
LNCS 209
-
R. Blom, An optimal class of symmetric key generation systems, Eurocrypt'84, LNCS 209, (1985), 335-338.
-
(1985)
Eurocrypt'84
, pp. 335-338
-
-
Blom, R.1
-
6
-
-
84984842401
-
Maintaining security in the presence of transient faults
-
LNCS 839
-
R. Canetti and A. Herzberg, Maintaining security in the presence of transient faults, Crypto'94, LNCS 839, 1994.
-
(1994)
Crypto'94
-
-
Canetti, R.1
Herzberg, A.2
-
7
-
-
84898947315
-
Multiparty Unconditionally Secure Pro-tocols
-
D. Chaum, C. Crepeau and I. Damgard, Multiparty Unconditionally Secure Pro-tocols, Proc. 20th Annual Symp. on the Theory of Computing, ACM, 1988, 11-19.
-
(1988)
Proc 20Th Annual Symp on the Theory of Computing, ACM
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
8
-
-
0022199386
-
Veri_able Secret Sharing and Achieving Simultaneity in Presence of Faults
-
B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Veri_able Secret Sharing and Achieving Simultaneity in Presence of Faults, Proc. 26th Annual Symp. on the Foundations of Computing Science, IEEE, 1985, 383-395.
-
(1985)
Proc 26Th Annual Symp on the Foundations of Computing Science, IEEE
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
11
-
-
11844281095
-
Proactive RSA, Crypto'97
-
Y. Frankel, P. Gemmel, P. D. MacKenzie and M. Yung, Proactive RSA, Crypto'97, LNCS 1294, 440-452.
-
LNCS
, pp. 440-452
-
-
Frankel, Y.1
Gemmel, P.2
Mackenzie, P.D.3
Yung, M.4
-
13
-
-
71149116146
-
Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems
-
O. Goldreich, S. Micali and A. Wigderson, Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems, Journal of the ACM, 38(1991), 691-729.
-
(1991)
Journal of the ACM
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
0030646698
-
-
Security, April
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yung, Proactive public key and signature systems, The 4th ACM Symp. on Comp. and Comm. Security, April 1997.
-
(1997)
Proactive Public Key and Signature Systems, the 4Th ACM Symp on Comp and Comm
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
15
-
-
0000299804
-
Proactive secret sharing or: How to cope with perpetual leakage
-
LNCS 963339-352
-
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, Proactive secret sharing or: How to cope with perpetual leakage, Crypto'95, LNCS 963339-352.
-
Crypto'95
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
16
-
-
84921169347
-
A protocol to set up shared secret schemes without the assistance of a mutually trusted party
-
LNCS 473
-
I. Ingemarsson and G. J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutually trusted party, Eurocrypt'90, LNCS 473, 1990, 266-282.
-
(1990)
Eurocrypt'90
, pp. 266-282
-
-
Ingemarsson, I.1
Simmons, G.J.2
-
19
-
-
84982943258
-
Non-interactive and information-theoretic secret sharing, Advances
-
LNCS 576
-
T. P. Pedersen, Non-interactive and information-theoretic secret sharing, Advances in Cryptology - Crypto'91, LNCS 576, 1991, 129-140.
-
(1991)
Cryptology - Crypto'91
, pp. 129-140
-
-
Pedersen, T.P.1
-
20
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or faulty
-
T. Rabin, Robust sharing of secrets when the dealer is honest or faulty, Journal of the ACM, 41(1994), 1089-1109.
-
(1994)
Journal of the ACM
, vol.41
, pp. 1089-1109
-
-
Rabin, T.1
-
21
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
LNCS 1462
-
T. Rabin, A simplified approach to threshold and proactive RSA, Crypto'98, LNCS 1462, 1998, 89-104.
-
(1998)
Crypto'98
, pp. 89-104
-
-
Rabin, T.1
-
23
-
-
0018545449
-
How to share a secret, Commun
-
A. Shamir, How to share a secret, Commun. ACM, 22(1979), 612-613.
-
(1979)
ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
84944090425
-
An application of covering designs: Determining the maximum consistent set of shares
-
to appear
-
R. S. Rees, D. R. Stinson, R. Wei and G. H. J. van Rees, An application of covering designs: determining the maximum consistent set of shares in a threshold scheme, Ars Combin., to appear.
-
A Threshold Scheme, Ars Combin
-
-
Rees, R.S.1
Stinson, D.R.2
Wei, R.3
Van Rees, G.H.4
-
26
-
-
0024141971
-
How to share a secret with cheaters
-
M. Tompa and H. Woll, How to share a secret with cheaters, Journal of Cryptology, 1(1988), 133-138.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
|