Y. Frankel, "A practical protocol for large group oriented networks", Advances in Cryptology, Proc. of Eurocrypt '89 (Lecture Notes in Computer Science 434) (1990), J.-J. Quisquater and J. Vandewalle, Eds. Springer-Verlag pp. 56-61. |
Y. Desmedt et al, "Shared generationof authenticators and signatures", Advances in Cryptology, Crypto '91, Proceedings (Lecture Notes in Computer Science 576) (1992), J. Feigenbaum, Ed. Springer-Verlag pp. 457-469. |
A. Shamir, "How to share a secret", Commun. ACM 22 (1979) 612-613. |
A De Santis et al, "How to share a function securely", undated. |
Y. Desmedt, "Threshold Cryptosystems", undated. |
R.A. Croft et al, "PUBLIC-KEY CRYPTROGRAPHY AND RE-USABLE SHARED SECRETS", Cryptography and coding, 1986, pp. 189-201. |
C. Boyd, "DIGITAL MULTISIGNATURES", Cryptography and coding, 1986, pp. 241-246. |
Y. Frankel, "A PRACTICAL PROTOCOL FOR LARGE GROUP ORIENTED NETWORKS", 1989. |
B. Blakley et al, "THRESHOLD SCHEMES WITH DISENROLLMENT", 1994. |
Yvo G. Desmedt, "Threshold Cryptography", Jul./Aug 1994. |
Ham, "Group-oriented (t,n) threshold digitial signature scheme and digital multisignature", IEE Proc. Comput. Digit. Tech. vol. 141, No. 5, Sep. 1994, pp. 307-313. |
Colin Boyd, "Some Applications of Multiple Key Ciphers" (undated). |
"Threshold Hashing and Signing", Extended Abstract, (undated). |