Threshold cryptography
- 1 July 1994
- journal article
- research article
- Published by Wiley in European Transactions on Telecommunications
- Vol. 5 (4), 449-458
- https://doi.org/10.1002/ett.4460050407
Abstract
No abstract availableKeywords
This publication has 35 references indexed in Scilit:
- An almost-constant round interactive zero-knowledge proofInformation Processing Letters, 1992
- A digital multisignature scheme using bijective public-key cryptosystemsACM Transactions on Computer Systems, 1988
- Minimum disclosure proofs of knowledgeJournal of Computer and System Sciences, 1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Probabilistic algorithm for testing primalityJournal of Number Theory, 1980
- How to share a secretCommunications of the ACM, 1979
- INFLUENZA VACCINATION POLICYThe Lancet, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- A Fast Monte-Carlo Test for PrimalitySIAM Journal on Computing, 1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976