Full paper (pdf) - CDC
Full paper (pdf) - CDC
Full paper (pdf) - CDC
Sie wollen auch ein ePaper? Erhöhen Sie die Reichweite Ihrer Titel.
YUMPU macht aus Druck-PDFs automatisch weboptimierte ePaper, die Google liebt.
[FGPY97] Y. Frankel, P. Gemmell, P.D.MacKenzie und M. Yung:<br />
Optimal-resilience proactive public-key cryptosystems. In Proc. 38th<br />
Annual Symposium on Foundations of Computer Science, S. 384–<br />
393, 1997.<br />
[GHJV96] Erich Gamma, Richard Helm, Ralph Johnson und John<br />
Vlissides: Entwurfsmuster. Addison-Wesley, 1996.<br />
[GJKR96] Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk und<br />
Tal Rabin: Robust Threshold DSS Signatures. Lecture Notes in<br />
Computer Science, 1070:354–371, 1996.<br />
[MSY00] Shingo Miyazaki, Kouichi Sakurai und Moti Yung: On<br />
Threshold RSA-Signing with no Dealer. In Song, JooSeok (Herausgeber):<br />
ISISC’99, S. 197 – 207. Springer Verlag, 2000.<br />
[Oak98] Scott Oaks: Java Security. O’Reilly, 1998.<br />
[Ped91] Torben Pedersen: A threshold cryptosystem without a trusted<br />
party. Advances in Cryptology–EUROCRYPT’91, 547:522–526,<br />
1991.<br />
[Ped92] Torben Pedersen: Non-interactive and information-theoretically<br />
secure verifiable secret sharing. Advances in Cryptology–<br />
CRYPTO’91, 576:129–140, 1992.<br />
[RSA78] R. L. Rivest, A. Shamir und L. M. Adleman: a method for<br />
obtaining digital signatures and public-key cryptosystems. Communications<br />
of the ACM, 21(2):120–126, 1978.<br />
[Sha79] Adi Shamir: How to Share a Secret. Communications of the ACM,<br />
22(11):612–613, November 1979.<br />
[Sho00] Victor Shoup: Practical Threshold Signatures. In Theory and<br />
Application of Cryptographic Techniques, S. 207–220, 2000.<br />
[WMB99] Thomas Wu, Michael Malkin und Dan Boneh: Building Intrusion<br />
Tolerant Applications. In Proceedings of the 8th USENIX<br />
symposium, S. 79 – 91, 1999.<br />
[YY96] Adam Young und Moti Yung: The Dark Side of Black-Box Cryptography.<br />
Advances in Cryptology–CRYPTO’96, S. 89–103, 1996.<br />
[YY97] Adam Young und Moti Yung: Kleptography: Using Cryptography<br />
Against Cryptography. Advances in Cryptology–EUROCRYPT’97,<br />
1233:62–74, 1997.<br />
[ZSvR00] Lidong Zhou, Fred B. Schneider und Robbert van Renesse:<br />
COCA: A secure distributed on-line certification authority. Technischer<br />
Report, Department of Computer Science, Cornell University,<br />
2000.<br />
95