Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
A course in number theory and cryptography
A course in number theory and cryptography
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
A “paradoxical” identity-based signature scheme resulting from zero-knowledge
CRYPTO '88 Proceedings on Advances in cryptology
How to (really) share a secret
CRYPTO '88 Proceedings on Advances in cryptology
A practical protocol for large group oriented networks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Communications of the ACM
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Cryptosystem for group oriented cryptography
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Conditionally secure secret sharing schemes with disenrollment capability
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Witness-based cryptographic program checking and robust function sharing
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Robust efficient distributed RSA-key generation
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP
Proceedings of the 7th ACM conference on Computer and communications security
Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Adaptively secure distributed public-key systems
Theoretical Computer Science
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Robust Key-Evolving Public Key Encryption Schemes
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
SiBIR: Signer-Base Intrusion-Resilient Signatures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Separating agreement from execution for byzantine fault tolerant services
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Automatic generation of two-party computations
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 10th ACM conference on Computer and communications security
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Shared generation of pseudo-random functions
Journal of Complexity - Special issue on coding and cryptography
Group-oriented signature scheme with distinguished signing authorities
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
Improved topology assumptions for threshold cryptography in mobile ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
A secure multidimensional point inclusion protocol
Proceedings of the 9th workshop on Multimedia & security
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
International Journal of Advanced Media and Communication
VoteBox: a tamper-evident, verifiable electronic voting system
SS'08 Proceedings of the 17th conference on Security symposium
The case for networked remote voting precincts
EVT'08 Proceedings of the conference on Electronic voting technology
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Distributed hierarchical key management scheme in mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A hierarchical identity based key management scheme in tactical mobile ad hoc networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Keeping data secret under full compromise using porter devices
Proceedings of the 26th Annual Computer Security Applications Conference
Exploiting the client vulnerabilities in internet E-voting systems: hacking Helios 2.0 as an example
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Network trust management in emergency situations
Journal of Computer and System Sciences
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
Research note: General secret sharing scheme
Computer Communications
Secure and practical threshold RSA
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
In a society oriented cryptography it is better to have a public key for the company (organization) than having one for each individual employee [Des88]. Certainly in emergency situations, power is shared in many organizations. Solutions to this problem were presented [Des88], based on [GMW87], but are completely impractical and interactive. In this paper practical non-interactive public key systems are proposed which allow the reuse of the shared secret key since the key is not revealed either to insiders or to outsiders.