Desmedt et al., “Shared generation of authenticators and signatures”, Lecture Notes in Computer Science 576, Advances in Cryptology, CRYPTO '91, 1991, pp. 457-469. |
Li et al., “Remark on the Threshold RSA Signature Scheme”, Lecture Notes in Computer Science 773, Advances in Cryptology—CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, Aug. 1993, p. 413-419. |
Pedersen, “A Threshold Cryptosystem Without a Trusted Party”, Lecture Notes in Computer Science 547, Advances in Cryptology—EUROCRYPT '91, Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, Apr. 1991, pp. 522-526. |
Chang et al., “A New Generalized Group-Oriented, Cryptoscheme Without Trusted Centers”, IEEE Journal on Selected Areas of Communications, Jun. 1993, pp. 725-729, vol. 11, No. 5. |
Frankel et al., Non-existence of homomorphic general sharing schemes for some key spaces, pp. 549-557 undated. |
Pedersen, “Distributed Provers with Applications to Undeniable Signatures”, Aarhus University, Computer Science Department, Ny Munkegade, DK-8000 Arhus C, Denmark, pp. 221-242 undated. |
Reiter et al., “How to Securely Replicate Services”, pp. 987-1009 undated. |
Desmedt et al., “Homorphic Zero-Knowledge Threshold Schemes Over Any Finite Abelian Group”, Siam J. Disc Math., vol. 7, No. 4, pp. 667-679, Nov. 1994. |
Y. Frankel, “A practical protocol for large group oriented networks”, Advances in Cryptology, Proc. of Eurocrypt '89 (Lecture Notes in Computer Science 434) (1990), J.-J. Quisquater and J. Vandewalle, Eds. Springer-Verlag, pp. 56-61. |
Y. Desmedt et al., “Shared generation of authenticators and signatures”, Advances in Cryptology, Crypto '91, Proceedings (Lecture Notes in Computer Science 576)(1992), J. Feigenbaum, Ed. Springer-Verlag, pp. 457-469. |
A. Shamir, “How to share a secret”, Commun. ACM 22 (1979) 612-613. |
A. De Santis et al., “How to share a function securely” undated. |
Y. Desmedt, “Threshold Cryptosystems” undated. |
Y. Desmedt, “Threshold Cryptography”, Jul./Aug. 1994. |
Ham, “Group-oriented (t,n) threshold digital signature scheme and digital multisignature”, IEE Proc. Comput. Digit. Tech. vol. 141, No. 5, Sep. 1994, pp. 307-313. |
C. Boyd, “Some Applications of Multiple Key Ciphers”, undated.* |
“Threshold Hashing and Signing”, Extended Abstract, undated.* |
R.A. Croft et al., “Public-Key Cryptography and Re-Usable Shared Secrets” undated.* |
C. Boyd, “Digital Multisignatures”, Cryptography and Coding undated.* |
Y. Frankel, “A Practical Protocol for Large Group Oriented Networks” undated.* |
B. Blakley et al., “Threshold Schemes With Disenrollment” undated. |