S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts,Communications of the ACM
, Vol. 28, pp. 637–647, June 1985.Google Scholar
E. F. Brickell, D. Chaum, I. Damgard, and J. Van de Graaf, Gradual and veriable release of a secret,Advances in Cryptology-CRYPTO'87, pp. 156–166, 1987.
M. Blum, How do exchange (secret) keys, Proceedings of STOC'83, pp. 440–447, 1983.
R. Cleve, Controlled gradual disclosure schemes for random bits and their applications,Advances in Cryptology-CRYPTO'89, pp. 573–588, 1989.
I. Damgard, Practical and provably secure exchange of digital signatures,Advances in Cryptology-EUROCRYPT'93, pp. 200–217, 1993.
M. Luby, S. Micali, and C. Rackoff, How to simultaneously exchange secret bit by flipping a symmetrically-biased coin. Proceedings of FOCS'83, pp. 23–30, 1983.
T. Okamoto and K. Ohta, How to simultaneously exchange secrets by general assumptions. Proceedings of 2nd ACM Conference on Computer and Communications Security, pp. 184–192, Fairfax, Virginia, November 1994.
A. Yao, How to generate and exchange secrets. Proceedings of FOCS'86, pp. 162–167, 1986.
M. Ben-Or, O. Goldreich, S. Micali, and R. Rivest, A fair protocol for signing contracts,IEEE Transactions on Information Theory, Vol. 36, pp. 40–46, January 1990.
M. T. Rose,The Internet Message: Closing the Book with Electronic Mail
, PTR Prentice Hall, Englewood Cliffs, New Jersey, 1993.Google Scholar
CCITT, Message Handling Systems, X. 400 Series Recommendations, 1988.
R. Kailar, Reasoning about accountability in protocols for electronic commerce, Proceedings of 1995 IEEE Symposium on Security and Privacy, pp. 236–250. Oakland, California, May 1995.
S. Radicati,Electronic Mail: An Introduction to the X.400 Message Handling Standards
. McGraw-Hill, Inc., New York, 1992.Google Scholar
W. Diffie and M. Hellman, New directions in cryptography,IEEE Transactions on Information Theory
, Vol. 22, pp. 644–654, 1976.Google Scholar
M. Reiter, A secure group membership protocol. Proceedings of the Symposium on Research in Security and Privacy, pp. 176–189, Oakland, California, May 1994.
C. Lai, G. Medvinsky, and B. C. Neuman, Endorsements, licensing, and insurance for distributed system services, Proceedings of 2nd ACM Conference on Computer and Communications Security, pp. 170–175, Fairfax, Virginia, November 1994.
L. Gong, Increasing availability and security of an authentication service.IEEE J. Selected Areas Communications
, Vol. 11, pp. 657–662, June 1993.Google Scholar
M. K. Franklin and M. K. Reiter, The design and implementation of a secure auction service. Proceedings of 1995 IEEE Symposium on Security and Privacy, pp. 2–14, Oakland, California, May 1995.