References
- Yaga, Dylan, et al. "Blockchain technology overview." arXiv preprint arXiv:1906.11078 (2019).
- github, www.github.com
- Zheng, Zibin, et al. "An overview of blockchain technology: Architecture, consensus, and future trends." 2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 2017.
- Hong, Jeongdae, et al. "Fair threshold decryption with semi-trusted third parties." Australasian Conference on Information Security and Privacy. Springer, Berlin, Heidelberg, 2009.
- Pedersen, Torben Pryds. "A threshold cryptosystem without a trusted party." Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991.
- Daemen, Joan, and Vincent Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
- ElGamal, Taher. "A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE transactions on information theory 31.4 (1985): 469-472. https://doi.org/10.1109/TIT.1985.1057074
- Shamir, Adi. "How to share a secret." Comm unications of the ACM 22.11 (1979): 612-613. https://doi.org/10.1145/359168.359176
- Reiter, Michael K., and Kenneth P. Birman. "How to securely replicate services." ACM Transactions on Programming Languages and Systems (TOPLAS) 16.3 (1994): 986-1009. https://doi.org/10.1145/177492.177745
- Gennaro, Rosario, et al. "Robust threshold DSS signatures." International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1996.
- Frankel, Yair, Peter Gemmell, and Moti Yung. "Witness-based cryptographic program checking and robust function sharing." STOC. Vol. 96. No. 47. 1996.
- Gennaro, Rosario, et al. "Robust and efficient sharing of RSA functions." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1996.
- Pedersen, Torben Pryds. "A threshold cryptosystem without a trusted party." Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991.
- Boneh, Dan, and Matthew Franklin. "Efficient generation of shared RSA keys." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1997.
- Ostrovsky, Rafail, and Moti Yung. "How to withstand mobile virus attacks." PODC. Vol. 91. 1991.
- Herzberg, Amir, et al. "Proactive secret sharing or: How to cope with perpetual leakage." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1995.
- Desmedt, Yvo, and Sushil Jajodia. Redistrib uting secret shares to new access structures and its applications. Vol. 148. Technical Report ISSE TR-97-01, George Mason University, 1997.
- Frankel, Yair, et al. "Optimal-resilience proactive public-key cryptosystems." Proceedings 38th Annual Symposium on Foundations of Computer Science. IEEE, 1997.
- C. Gehrmann and Y. Desmedt, Truly Anonym ous secret sharing. Manuscript.
- Li, Chuan-Ming, Tzonelih Hwang, and Narn-Yih Lee. "Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders." Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1994.
- Desmedt, Yvo, Giovanni Di Crescenzo, and Mike Burmester. "Multiplicative non-abelian sharing schemes and their application to threshold cryptography." International Conference on the Theory and Application of Cryptology. Springer, Berlin, Heidelberg, 1994.
- Alon, Noga, Zvi Galil, and Moti Yung. "Efficient dynamic-resharing "verifiable secret sharing" against mobile adversary." European Symposium on Algorithms. Springer, Berlin, Heidelberg, 1995.