Shared generation of authenticators and signatures
- 18 May 2001
- book chapter
- Published by Springer Nature
- p. 457-469
- https://doi.org/10.1007/3-540-46766-1_37
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Threshold cryptosystemsPublished by Springer Nature ,2001
- Secret Sharing Over Infinite DomainsPublished by Springer Nature ,2001
- A signature with shared verification schemePublished by Springer Nature ,1990
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- Attacks on Some RSA SignaturesLecture Notes in Computer Science, 1986
- Digital signatures with RSA and other public-key cryptosystemsCommunications of the ACM, 1984
- Rivest-Shamir-Adleman public key cryptosystems do not always conceal messagesComputers & Mathematics with Applications, 1979
- New directions in cryptographyIEEE Transactions on Information Theory, 1976