References
- M. Franklin and M. Reiter, 'Fair exchange with a semitrusted third party,' In Proc. ACM Conference on Computer and Communications Security, 1997 https://doi.org/10.1145/266420.266424
- William Stallings, 'CRYPTOGRAPHY AND NETWORK SECURITY : Principles and Practice,' Second Edition, Prentice- Hall
- Kenji Imamoto, Kouichi Sakurai, 'A Certified E-mail System with Receiver's Selective Usage of Delivery Authority,' INDOCRYPT 2002, LNCS 2551, 2002
- G. Ateniese, B. D. Medeiros and M. T. Goodrich. 'TRICERT : A Distributed Certified E-Mail Scheme,' In ISOC 2001 Network and Distributed System Security Symposium (NDSS '01), San Diego, CA, USA, Feb., 2001
- J. Zhou and D. Gollmann, 'Certified electronic mail,' In Computer Security-ESORICS '96 Proceedings, pp.55-61. Springer Verlag, 1996
- B. Schneier and J. Riordan, 'A certified e-mail protocol,' 13th Annual Computer Security Applications Conference, pp.100-106, Dec., 1998
- N. Asokan, G. Tsudic, M. Waidner, 'Server Supported Signatures,' European Symposium on Research in Computer Security, September, 1996
- X. Ding, D. Mazzocchi and G. Tsudik, 'Experimenting with Server-Aided Signatures,' 2002 Network and Distributed Systems Security Symposium (NDSS '02), February, 2002
- D. Malkhi and M. Reiter, 'Byzantine quorum systems,' Distributed Computing, 11(4), pp.203-213, 1998 https://doi.org/10.1007/s004460050050
- A. De Santis, Y. Desmedt, Y. Frankel and M. Yung, 'How to share a function securely,' In Proceedings of the 26th ACM Symposium on the Theory of Computing, Santa Fe, pp.522-533, 1994 https://doi.org/10.1145/195058.195405
- P. Gemmel, 'An introduction to threshold cryptography,' in CryptoBytes, a technical newsletter of RSA Lab. Vol. 2, No.7, 1997
- R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, 'Robust and efficient sharing of RSA functions,' In Advances in Cryptology-Crypto '96, LNCS 1109, pp.157-172, 1996
- Victor Shoup, 'Practical threshold signatures,' in Proc. Eurocrypt, 2000
- L. Harn, 'Group oriented (n, t) digital signature scheme,' IEE Proceedings-Computer and Digital Techniques, 141(5), pp.307-313, September, 1994 https://doi.org/10.1049/ip-cdt:19941293
- M. Cerecedo, T. Matsumoto, H. Imai, 'Efficient and secure multiparty generation of digital signatures based on discret logarithms,' IEICE Transactions on Fundamentals of Electronics, Information and Communication Engineers, April, 1993
- Alfred, J. Menezes, Paul, C. van Oorshot, Scoot, A. Vanstone, 'Handbook of Applied Cryptography,' CRC Press, 1997
- A. Herzberg, S. Jarechi. H. Krawczyk and M. Yung 'Proactive secret sharing or: How to cope with perpetual leakage,' Advances in Cryptology -Crypto '95, the 15th Annual International Cryptology Conference, Proceedings, volumn 963 of LNCS, pp.457-469
- S. Jarecki, 'Proactive Secret Sharing and Public Key Cryptosystems,' Master thesis, MIT, 1996