Matsumoto, T. et al: “Speeding up Secret Computations with Insecure Auxiliary Devices”, Advances In Cryptology—Crypto ' 88 Proceedings, Santa Barbara, CA, USA, Aug. 21-25, 1988, pp. 497-506, XP000345652, 1990, Berlin, West Germany, Springer-Verlag. |
Kawamura S. et al: “Fast server-Aided Secret Computaion Protocols for Modular Exponentiation”, IEEE Journal on Selected Areas In Communications, pp. 778-784, XP000399846, Jun. 1993, USA, vol. 11, No. 5. |
Blaze, M. et al: “Divertible Protocols and Atomic Proxy Cryptography”, Advances In Crypology—Eurocrypt '98, International Conference on the Theory and Application of Cryptographic Techniques Proceedings, pp. 127-144, XP 002127731, 1998, Berlin, West Germany, Springer-Verlag. |
Nanbim N. et al: “Proxy Crytosystems: Delegation of the Power to Decrypt Ciphertexts”, IEICE Transactions on Fundamentals of Electronics, Communication and Computer Sciences, Inst. Electron. Inf. & Commun., pp. 54-63, XP000742245, Eng. Japan, Jan. 1997. |
R.L. Rivest et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM vol. 21, pp. 120-126 (Feb. 1978). |
M.E. Hellman, “The Mathematics of Public-Key Cryptography”, Scientific American vol. 234, No. 8, pp. 146-152, 154-157 (Aug. 1979). |
C.E. Shannon, “Communication Theory of Secrecy Systems”, Bell System Technical Journal vol. 28, pp. 656-715 (Oct. 1949). |
Y. Desmedt et al., “Shared Generation of Authenticators and Signatures”, Advances in Cryptology—Crypto '91, Lecture Notes in Computer Science, vol. 537, pp. 457-469, Springer-Verlang (1991). |
The Charon protocol, Which is described in A.Fox et al., “Security on the Move: Indirect Authentication Using Kerberos”, Proceedings Mobicom 96 (1996). |
J. Feigenbaum, “Encrypting Problem Instances, or, . . . Can you Take Advantage of someone Without Having to Trust Him”, Advances in Cryptology—Crypto '85, Lecture Notes in Computer Science, vol. 218, pp. 477-488, Springer-Verlag (1986). |
B. Schneier, “Applied Cryptography, Second Edition, Protocols, Algorithms, And Source Code In C”, ISBN 0-471-12845-7. |
M. Blaze, M. Strauss, “Atomic Proxy Cryptography”, AT&T Labs —Research, Feb. 23, 1998. |
Whitfield Diffee, “The First Ten Years of Public-Key Cryptography,” Mar. 25, 1988, IEEE Log No. 8821645. |