Verifiable Signature Sharing
- 1 January 1995
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- The design and implementation of a secure auction servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- The round complexity of secure protocolsPublished by Association for Computing Machinery (ACM) ,1990
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Verifiable secret sharing and achieving simultaneity in the presence of faultsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- The Byzantine Generals ProblemACM Transactions on Programming Languages and Systems, 1982