Robust and Efficient Sharing of RSA Functions
- 1 January 1996
- book chapter
- Published by Springer Nature
- p. 157-172
- https://doi.org/10.1007/3-540-68697-5_13
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Threshold cryptosystemsPublished by Springer Nature ,2001
- Convertible Undeniable SignaturesPublished by Springer Nature ,2001
- Shared generation of authenticators and signaturesPublished by Springer Nature ,2001
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- How to share a function securelyPublished by Association for Computing Machinery (ACM) ,1994
- Undeniable SignaturesPublished by Springer Nature ,1990
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987