Author:
Herzberg Amir,Jarecki Stanisław,Krawczyk Hugo,Yung Moti
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. M. Bellare and P. Rogaway, Optimal Asymmetric Encryption, Eurocrypt’ 94.
2. G.R. Blakley, Safeguarding Cryptographic Keys, AFIPS Con. Proc (v. 48), 1979, pp 313–317.
3. Lect Notes Comput Sci;R. Canetti,1994
4. R. Canetti and A. Herzberg, Proactive Maintenance of Authenticated Communication, manuscript, 1995.
5. B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable Secret Sharing and Achieving Simultaneous Broadcast, Proc. of IEEE Focs 1985, pp. 335–344.
Cited by
231 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Timed Data Release Using Smart Contracts;2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS);2024-07-23
2. Secure Archival is Hard... Really Hard;Proceedings of the 16th ACM Workshop on Hot Topics in Storage and File Systems;2024-07-08
3. Self-Organizing Key Security Management Algorithm in Socially Aware Networking;Journal of Signal Processing Systems;2024-05-27
4. Quantum Advantage of Threshold Changeable Secret Sharing Scheme;International Journal of Theoretical Physics;2024-04-29
5. Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches;Multimedia Tools and Applications;2024-04-19