Author:
Boneh Dan,Franklin Matthew
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. N. Alon, Z. Galil and M. Yung, “Dynamic-resharing verifiable secret sharing,” ESA 1995.
2. D. Beaver, “Security, fault tolerance, and communication complexity in distributed systems,” Ph.D. thesis, Harvard University, May 1990.
3. M. Ben-Or, S. Goldwasser, A. Wigderson, “Completeness theorems for noncryptographic fault tolerant distributed computation”, STOC 1988, pp. 1–10.
4. J. Benaloh (Cohen), “Secret sharing homomorphisms: keeping shares of a secret secret,” Crypto '86, 251–260.
5. J. Carter and M. Wegman, “Universal classes of hash functions”, J. Comput. Syst. Sci. 18 (1979), 143–154.
Cited by
128 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Transforming future technology with quantum-based IoT;The Journal of Supercomputing;2024-06-23
2. Providing Security for a Chat Application using RSA Encryption with GPG;2024 3rd International Conference for Innovation in Technology (INOCON);2024-03-01
3. Powers-of-Tau to the People: Decentralizing Setup Ceremonies;Lecture Notes in Computer Science;2024
4. Threshold Cryptography;Encyclopedia of Cryptography, Security and Privacy;2024
5. Cryptanalysis of Algebraic Verifiable Delay Functions;Lecture Notes in Computer Science;2024