Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography, Crypto '04, pp.317-334, 2004. ,
DOI : 10.1007/978-3-540-28628-8_20
Structure-preserving signatures and commitments to group elements, Crypto '10, pp.209-236, 2010. ,
Signing on elements in bilinear groups for modular protocol design, Cryptology ePrint Archive, 2010. ,
Simplified Threshold RSA with Adaptive and Proactive Security, Eurocrypt '06, pp.593-611, 2006. ,
DOI : 10.1007/11761679_35
Pairing-Friendly Elliptic Curves of Prime Order, SAC '05, pp.319-331, 2005. ,
DOI : 10.1007/11693383_22
Randomizable Proofs and Delegatable Anonymous Credentials, Crypto '09, pp.108-125, 2009. ,
DOI : 10.1007/978-3-642-03356-8_7
Unrestricted Aggregate Signatures, ICALP '07, pp.411-422, 2007. ,
DOI : 10.1007/978-3-540-73420-8_37
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters??? IBE Scheme, Eurocrypt '09, pp.407-424, 2009. ,
DOI : 10.1007/11426639_7
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, PKC '03, pp.31-46, 2003. ,
DOI : 10.1007/3-540-36288-6_3
Short Group Signatures, Crypto '04, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Efficient Generation of shared RSA keys, Crypto '97, pp.425-439, 1924. ,
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Eurocrypt '03, pp.416-432, 2003. ,
DOI : 10.1007/3-540-39200-9_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459
Short signatures from the Weil pairing, Earlier version in Asiacrypt '01, pp.297-319, 2001. ,
Digital Multisignatures, Cryptography and Coding, pp.241-246, 1989. ,
Adaptive Security for Threshold Cryptosystems, Crypto '99, pp.98-115, 1999. ,
DOI : 10.1007/3-540-48405-1_7
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), Eurocrypt '99, pp.90-106, 1999. ,
DOI : 10.1007/3-540-48910-X_7
Shorter IBE and Signatures via Asymmetric Pairings, Pairing '12, pp.122-140, 2012. ,
DOI : 10.1007/978-3-642-36334-4_8
On the Exact Security of Full Domain Hash, Crypto '00, pp.229-235, 2000. ,
DOI : 10.1007/3-540-44598-6_14
Distributed ElGamaì a la Pedersen: Application to Helios, WPES '13, pp.131-142, 2013. ,
Multi-autority secret-ballot elections with linear work, Eurocrypt '96, pp.72-83, 1996. ,
A Secure and Optimally Efficient Multi-Authority Election Scheme, Eurocrypt '97, pp.103-118, 1997. ,
DOI : 10.1007/3-540-69053-0_9
Multiparty computation from threshold homomorphic encryption, Eurocrypt '01, pp.280-299, 2001. ,
Efficient multi-party computations secure against an adaptive adversary, Eurocrypt '99, pp.311-326, 1999. ,
Efficient, Robust and Constant-Round Distributed RSA Key Generation, TCC '10, pp.183-200, 2010. ,
DOI : 10.1145/359168.359176
A Note On Game-Hopping Proofs. Cryptology ePrint Archive, Report, vol.260, 2006. ,
How to share a function securely, Proceedings of the twenty-sixth annual ACM symposium on Theory of computing , STOC '94, pp.522-533, 1994. ,
DOI : 10.1145/195058.195405
Society and Group Oriented Cryptography: a New Concept, Crypto '87, pp.120-127, 1987. ,
DOI : 10.1007/3-540-48184-2_8
Threshold cryptosystems, Crypto '89, pp.307-315, 1990. ,
A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437, 1987. ,
DOI : 10.1109/SFCS.1987.4
Fully Distributed Threshold RSA under Standard Assumptions, Asiacrypt '01, pp.310-330, 2001. ,
DOI : 10.1007/3-540-45682-1_19
URL : https://hal.archives-ouvertes.fr/inria-00565271
Robust efficient distributed RSA-key generation, STOC '98, pp.663-672, 1998. ,
DOI : 10.1145/277697.277779
Adaptively-secure distributed public-key systems, ESA '99, pp.4-27, 1999. ,
Adaptively-Secure Optimal-Resilience Proactive RSA, Asiacrypt '99, pp.180-194, 1999. ,
DOI : 10.1007/978-3-540-48000-6_15
Optimal-resilience proactive public-key cryptosystems, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.384-393, 1997. ,
DOI : 10.1109/SFCS.1997.646127
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups, Eurocrypt '10, pp.44-61, 2010. ,
DOI : 10.1007/978-3-642-13190-5_3
Robust threshold DSS signatures, Eurocrypt '96, pp.354-371, 1996. ,
DOI : 10.1006/inco.2000.2881
URL : http://doi.org/10.1006/inco.2000.2881
Robust and efficient sharing of RSA functions, Crypto '96, pp.157-172, 1996. ,
Secure distributed key generation for discrete-log based cryptosystems, Eurocrypt '99, pp.295-310, 1999. ,
Secure Applications of Pedersen???s Distributed Key Generation Protocol, CT-RSA '03, pp.373-390, 2003. ,
DOI : 10.1007/3-540-36563-X_26
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Journal of Cryptology, vol.20, issue.1, pp.51-83, 2007. ,
DOI : 10.1007/s00145-006-0347-3
Threshold RSA for Dynamic and Ad-Hoc Groups, Eurocrypt '08, pp.88-107, 2008. ,
DOI : 10.1007/978-3-540-78967-3_6
Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt '08, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, Crypto '95, pp.339-352, 1995. ,
DOI : 10.1007/3-540-44750-4_27
Proactive public key and signature systems, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.100-110, 1997. ,
DOI : 10.1145/266420.266442
OceanStore: An architecture for global-scale persistent storage, ASPLOS '00, pp.190-201, 2000. ,
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures, Eurocrypt '00, pp.221-242, 2000. ,
DOI : 10.1007/3-540-45539-6_16
Threshold Cryptosystems Based on Factoring, Asiacrypt '02, pp.199-205, 2002. ,
DOI : 10.1007/3-540-36178-2_12
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC '10, pp.455-479, 2010. ,
DOI : 10.1007/978-3-540-78967-3_9
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting, Eurocrypt '12, pp.318-351, 2012. ,
DOI : 10.1007/978-3-642-29011-4_20
Linearly homomorphic structure-preserving signatures and their applications, Crypto '13, pp.289-307, 2013. ,
Adaptively secure non-interactive threshold cryptosystems, ICALP 2011, pp.76-100, 2011. ,
DOI : 10.1016/j.tcs.2013.01.001
Non-interactive CCA2-secure threshold cryptosystems with adaptive security: New framework and constructions, TCC '12, pp.75-93, 2012. ,
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes, Asiacrypt '01, pp.331-350, 2001. ,
DOI : 10.1007/3-540-45682-1_20
Signatures Resilient to Continual Leakage on Memory and Computation, TCC '11, pp.89-106, 2011. ,
DOI : 10.1007/978-3-642-19571-6_7
Number-theoretic constructions of efficient pseudo-random functions, FOCS '97, pp.458-467, 1997. ,
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Crypto '92, pp.31-53, 2011. ,
DOI : 10.1007/3-540-48071-4_3
How to withstand mobile virus attacks, PODC '91, pp.51-59, 1991. ,
A Threshold Cryptosystem without a Trusted Party, Eurocrypt '91, pp.522-526, 1991. ,
DOI : 10.1007/3-540-46416-6_47
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Crypto '91, pp.129-140, 1991. ,
DOI : 10.1007/3-540-46766-1_9
A simplified approach to threshold and proactive RSA, Crypto '98, pp.89-104, 1998. ,
DOI : 10.1007/BFb0055722
Pond: The OceanStore prototype, USENIX Workshop on File and Storage Technologies, 2003. ,
Authenticated ID-based key exchange and remote log-in with simple token and PIN number. Cryptology ePrint Archive, Report, vol.164, 2002. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Practical Threshold Signatures, Eurocrypt, pp.207-220, 2000. ,
DOI : 10.1007/3-540-45539-6_15
Threshold and Revocation Cryptosystems via Extractable Hash Proofs, Eurocrypt '11, pp.589-609, 2011. ,
DOI : 10.1007/978-3-642-20465-4_32
Adaptively secure threshold signature scheme in the standard model, In Informatica, vol.20, issue.4, pp.591-612, 2009. ,
Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt '05, 2005. ,
DOI : 10.1007/11426639_7
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Crypto '09, pp.619-636, 2009. ,
DOI : 10.1007/978-3-642-03356-8_36