Publisher
Springer Berlin Heidelberg
Reference6 articles.
1. Lecture Notes in Computer Science;Y. Desmedt,1988
2. Frankel, Y., Gemmel, P., et al.: Optimal-resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science, pp. 384–393 (1997)
3. Shoup, V.: Practical threshold signatures. In: Proceedings of the Eurocypt 2000, pp. 207–220 (2000)
4. Lecture Notes in Computer Science;Y. Desmedt,1990
5. Tang, S.: Simple Secret Sharing and Threshold RSA Signature Scheme. Journal of Information and Computational Science 1(2), 259–262 (2004)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges;2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW);2023-10-09
2. Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric;Proceedings of International Conference on Network Security and Blockchain Technology;2022
3. Anonymity and Privacy in Distributed Early Warning Systems;Critical Information Infrastructures Security;2011