R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive Security for Threshold Cryptosystems. Mansuscript, 1999.
Google Scholar
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology — Eurocrypt’ 97, pages 103–118. LNCS No. 1233.
Google Scholar
M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Trans. Fundamentals, E76-A(4):532–545, 1993.
Google Scholar
Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In Advances in Cryptology — Crypto’ 89, pages 307–315. LNCS No. 435.
Google Scholar
T. ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Info. Theory, IT 31:469–472, 1985.
CrossRef
MathSciNet
Google Scholar
P. Feldman. A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In Proc. 28th FOCS, pages 427–437.
Google Scholar
Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In Proc. 38th FOCS, pages 384–393. IEEE, 1997.
Google Scholar
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Advances in Cryptology — Eurocrypt’ 96, pages 354–371. LNCS No. 1070.
Google Scholar
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems http://www.research.ibm.com/security/dkg.ps
L. Harn. Group oriented (t; n) digital signature scheme. IEE Proc.-Comput.Digit.Tech, 141(5):307–313, Sept 1994.
MATH
CrossRef
Google Scholar
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public key and signature systems. In 1997 ACM Conference on Computers and Communication Security, 1997.
Google Scholar
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In Advances in Cryptology — Crypto’ 95, pages 339–352. LNCS No. 963.
Google Scholar
C.-H. Li, T. Hwang, and N.-Y. Lee. (t; n) threshold signature schemes ased on discrete logarithm. In Advances in Cryptology — Eurocrypt’ 94, pages 191–200. LNCS No. 950.
Google Scholar
T. Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology — Eurocrypt’ 91, pages 522–526. LNCS No. 547.
Google Scholar
T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology — Crypto’ 91, pages 129–140. LNCS No. 576.
Google Scholar
C. Park and K. Kurosawa. New ElGamal Type Threshold Digital Signature Scheme. IEICE Trans. Fundamentals, E79-A(1):86–93, January 1996.
Google Scholar
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161–174, 1991.
MATH
CrossRef
Google Scholar
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. In Advances in Cryptology — Eurocrypt’ 98, pages 1–16. LNCS No. 1403.
Google Scholar
A. Shamir. How to Share a Secret. Communications of the ACM, 22:612–613, 1979.
MATH
CrossRef
MathSciNet
Google Scholar