Author:
Deng Robert H.,Gong Li,Lazar Aurel A.,Wang Weiguo
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference18 articles.
1. S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts,Communications of the ACM, Vol. 28, pp. 637–647, June 1985.
2. E. F. Brickell, D. Chaum, I. Damgard, and J. Van de Graaf, Gradual and veriable release of a secret,Advances in Cryptology-CRYPTO'87, pp. 156–166, 1987.
3. M. Blum, How do exchange (secret) keys, Proceedings of STOC'83, pp. 440–447, 1983.
4. R. Cleve, Controlled gradual disclosure schemes for random bits and their applications,Advances in Cryptology-CRYPTO'89, pp. 573–588, 1989.
5. I. Damgard, Practical and provably secure exchange of digital signatures,Advances in Cryptology-EUROCRYPT'93, pp. 200–217, 1993.
Cited by
87 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献