David Chaum, “Blind Signatures for Untraceable Payments”, Proceedings of Crypto 82, Aug. 1982, p. 199-203. |
Ran Canetti et al., “Proactive Security: Long-Term Protection Against Break-Ins”, RSA Laboratories' CryptoBytes, vol. 3, No. 1, Spring 1997, p. 1-16. |
D. Chaum, “Achieving Electronic Privacy”, Scientific American, Aug. 1992, p. 96-101. Copyright © 1992. |
Hugo Krawczyk, “Secret Sharing Made Short”, Advances in Cryptology—Crypto 1993, Lecture Notes in Computer Science, pp. 136-146, Springer-Verlag, 1993. |
Krawczyk, H., “Distributed Fingerprints and Secure Information Dispersal”, Proc. 20th Anual ACM Symp. On Principles of Disb/tributed Computing , pp. 207-218, Ithaca, NY, 1993. |
Y.G. Desmedt. Threshold cryptography. European Transactions on Telecommunications, 5(4):449-457, Jul. 1994. |
Rabin, M., “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance”, Journal of the ACM, vol. 36(2), pp. 335-348-1989. |
Bellare M. et al., “Keying Hash Functions for Message Authentication,” Proc. Advances in Cryptology—CRYPTO 1996, LNCS vol. 1109, Springer-Verlag, pp. 1-15, 1996. |
L. Lamport et al., The Byzantine General Problem, ACM Trans. Prog. Lang. and Systems, 4:3 (1982), pp. 382-401. |
Shamir, A., “How to Share a Secret”, Communications of the ACM, vol. 22, pp. 612-613, 1979. |