-
1
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
BBM00. M. Bellare, A. Boldyreva, and S. Micali. Public-key encryption in a multi-user setting: security proofs and improvements. In Advances in Cryptology-Eurocrypt 2000, pages 259-274, 2000.
-
(2000)
Advances in Cryptology-Eurocrypt
, vol.2000
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
5
-
-
0027961556
-
How to share a function securely
-
DDFY94. A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In 26th Annual ACM Symposium on Theory of Computing, pages 522-533, 1994.
-
(1994)
26Th Annual ACM Symposium on Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
6
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Des87. Y. Desmedt. Society and group oriented cryptography: a new concept. In Advances in Cryptology-Crypto ’87, pages 120-127, 1987.
-
(1987)
Advances in Cryptology-Crypto ’87
, pp. 120-127
-
-
Desmedt, Y.1
-
8
-
-
85022187530
-
Shared generation of authenticators and signatures
-
DF91. Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In Advances in Cryptology-Crypto ’91, pages 457-569, 1991.
-
(1991)
Advances in Cryptology-Crypto ’91
, pp. 457-569
-
-
Desmedt, Y.1
Frankel, Y.2
-
9
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithms
-
ElG85. T. ElGamal. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31:469-472, 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
14
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
FS87. A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology-Crypto ’86, Springer LNCS 263, pages 186-194, 1987.
-
(1987)
Advances in Cryptology-Crypto ’86, Springer LNCS
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
84947441722
-
Robust and Efficient sharing of RSA functions
-
GJKR96a. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and Efficient sharing of RSA functions. In Advances in Cryptology-Crypto ’96, pages 157-172, 1996.
-
(1996)
Advances in Cryptology-Crypto ’96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
84947926543
-
Robust threshold DSS
-
GJKR96b. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS. In Advances in Cryptology-Eurocrypt ’96, pages 354-371, 1996.
-
(1996)
Advances in Cryptology-Eurocrypt ’96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
17
-
-
0028508211
-
Group-oriented (T;n) threshold digitial signature scheme and digital multisignature
-
Har94. L. Harn. Group-oriented (t;n) threshold digitial signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech., 141(5):307-313, 1994.
-
(1994)
IEE Proc.-Comput. Digit. Tech.
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
18
-
-
84957658795
-
A simple method for generating and sharing pseudo-random functions, with applications to Clipper-like key escrow systems
-
MS95. S. Micali and R. Sidney. A simple method for generating and sharing pseudo-random functions, with applications to Clipper-like key escrow systems. In Advances in Cryptology-Crypto ’95, pages 185-196, 1995.
-
(1995)
Advances in Cryptology-Crypto ’95
, pp. 185-196
-
-
Micali, S.1
Sidney, R.2
-
20
-
-
0342779118
-
A simplified approach to threshold and proactive RSA
-
Rab98. T. Rabin. A simplified approach to threshold and proactive RSA. In Advances in Cryptology-Crypto ’98, 1998.
-
(1998)
Advances in Cryptology-Crypto ’98
-
-
Rabin, T.1
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
RSA78. R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, pages 120-126, 1978.
-
(1978)
Communications of the ACM
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
22
-
-
0018545449
-
How to share a secret
-
Sha79. A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
0000164225
-
Lower bounds for discrete logarithms and related problems
-
Sho97. V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology-Eurocrypt ’97, 1997.
-
(1997)
Advances in Cryptology-Eurocrypt ’97
-
-
Shoup, V.1
-
24
-
-
3042666549
-
On formal models for secure key exchange
-
April
-
Sho99. V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120, April 1999.
-
(1999)
IBM Research Report RZ
, vol.3120
-
-
Shoup, V.1
|