David Chaum, "Blind Signatures for Untraceable Payments", Proceedings of Crypto 82, Aug. 1982, pp. 199-203. |
Ran Canetti et al., "Proactive Security: Long-Term Protection Against Break-Ins", RSA Laboratories' CryptoBytes, vol. 3, No. 1, Spring 1997, pp. 1-16. |
D. Chaum, "Achieving Electronic Privacy", Scientific American, Aug. 1992, pp. 96-101. Copyright .COPYRGT. 1992. |
Hugo Krawczyk, "Secret Sharing Made Short", Advances in Cryptology--Crypto 1993, Lecture Notes in Computer Science, pp. 136-146, Springer-Verlag, 1993. |
Krawczyk, H., "Distributed Fingerprints and Secure Information Dispersal", Proc. 20.sup.th Anual ACM Symp. On Principles of Disb.backslash.tributed Computing, pp. 207-218, Ithaca, NY, 1993. |
Y.G. Desmedt, "Threshold cryptography". European Transactions on Telecommunications, 5(4):449-457, Jul. 1994. |
Rabin M., "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance", Journal of the ACM, vol. 36(2), pp.335-348, 1989. |
Bellare M. et al., "Keying Hash Functions for Message Authentication," Proc. Advances in Cryptology--CRYPTO 1996, LNCS vol. 1109, Springer-Verlag, pp. 1-15, 1996. |
L. Lamport et al., The Byzantine General Problem, ACM Trans. Prog. Lang. and Systems, 4:3 (1982), pp. 382-401. |
Shamir, A., "How to Share a Secret", Communications of the ACM, vol. 22, pp. 612-613, 1979. |