@article(myref2, author = "C. Asmuth and J. Bloom", year = "1983", title = "A modular approach to key safeguarding", journal = "IEEE Transactions on Information Theory", volume = "29", number = "2", pages = "208--211", doi = "10.1109/TIT.1983.1056651", ) @article(1170.94325, author = "A. Behnad and T. Eghlidos", year = "2008", title = "A new, publicly verifiable, secret sharing scheme", journal = "Sci. Iran.", volume = "15", number = "2", pages = "246--251", ) @article(myref1, author = "G. R. Blakley", year = "1979", title = "Safeguarding cryptographic keys", journal = "Managing Requirements Knowledge, International Workshop on", volume = "0", pages = "313", doi = "10.1109/AFIPS.1979.98", ) @inproceedings(myref5, author = "F. Boudot and J. Traor\'{e}", year = "1999", title = "Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery", booktitle = "Proceedings of the Second International Conference, ICICS’99", series = "0302-9743", publisher = "Springer-Verlag", address = "Berlin, Heidelberg", pages = "87--102", doi = "10.1007/978-3-540-47942-0\_8", ) @inproceedings(Chor:1985:VSS:1382438.1382871, author = "B. Chor and S. Goldwasser and S. Micali and B. Awerbuch", year = "1985", title = "Verifiable secret sharing and achieving simultaneity in the presence of faults", booktitle = "Proceedings of the 26th Annual Symposium on Foundations of Computer Science", series = "SFCS '85", publisher = "IEEE Computer Society", address = "Washington, DC, USA", pages = "383--395", doi = "10.1109/SFCS.1985.64", ) @inproceedings(Feldman:1987:PSN:1382440.1383000, author = "P. Feldman", year = "1987", title = "A practical scheme for non-interactive verifiable secret sharing", booktitle = "Proceedings of the 28th Annual Symposium on Foundations of Computer Science", series = "SFCS '87", publisher = "IEEE Computer Society", address = "Washington, DC, USA", pages = "427--438", doi = "10.1109/SFCS.1987.4", ) @inproceedings(crypto-1986-1294, author = "A. Fiat and A. Shamir", year = "1986", title = "How to Prove Yourself: Practical Solutions to Identification and Signature Problems", booktitle = "Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings", series = "Lecture Notes in Computer Science", volume = "263", publisher = "Springer", pages = "186--194", doi = "10.1007/3-540-47721-7\_12", ) @inproceedings(myref4, author = "E. Fujisaki and T. Okamoto", year = "1998", title = "A practical and provably secure scheme for publicly verifiable secret sharing and its applications", booktitle = "Proceedings of the annual international conference on Theory and application of cryptographic techniques", series = "EUROCRYPT'98", publisher = "Springer-Verlag", address = "Berlin, Heidelberg", pages = "32--46", doi = "10.1007/BFb0054115", ) @incollection(Heidarvand:2009:PVP:1616707.1616734, author = "S. Heidarvand and J. L. Villar", year = "2009", title = "Selected Areas in Cryptography", chapter = "Public Verifiability from Pairings in Secret Sharing Schemes", publisher = "Springer-Verlag", address = "Berlin, Heidelberg", pages = "294--308", doi = "10.1007/978-3-642-04159-4\_19", ) @inproceedings(P.Jhanwar, author = "M. P. Jhanwar", year = "2011", title = "A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme", booktitle = "ISPEC'11", pages = "273--287", ) @article(myref3, author = "E. D. Karnin and J. W. Greene and M. E. Hellman", year = "1983", title = "On secret sharing systems", journal = "IEEE Transactions on Information Theory", volume = "29", number = "1", pages = "35--41", doi = "10.1109/TIT.1983.1056621", ) @inproceedings(DBLP:conf/eurocrypt/Paillier99, author = "P. Paillier", year = "1999", title = "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes", booktitle = "EUROCRYPT", pages = "223--238", doi = "10.1007/3-540-48910-X\_16", ) @inproceedings(Pedersen:1991:NIS:646756.705507, author = "T. Pedersen", year = "1992", title = "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing", booktitle = "Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology", series = "CRYPTO '91", publisher = "Springer-Verlag", address = "London, UK, UK", pages = "129--140", doi = "10.1007/3-540-46766-1\_9", ) @inproceedings(DBLP:conf/weworc/RuizV05, author = "A. Ruiz and J. L. Villar", year = "2005", title = "Publicly Verfiable Secret Sharing from Paillier's Cryptosystem", booktitle = "WEWoRC", pages = "98--108", url = "http://subs.emis.de/LNI/Proceedings/Proceedings74/article3801.html", ) @inproceedings(Schoenmakers:1999:SPV:646764.703956, author = "B. Schoenmakers", year = "1999", title = "A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic", booktitle = "Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology", series = "CRYPTO '99", publisher = "Springer-Verlag", address = "London, UK, UK", pages = "148--164", doi = "10.1007/3-540-48405-1\_10", ) @article(myref, author = "A. Shamir", year = "1979", title = "How to share a secret", journal = "Commun. ACM", volume = "22", number = "11", pages = "612--613", doi = "10.1145/359168.359176", ) @inproceedings(A.Benshil, author = "A. Ben Shil and K. Blibech and R. Robbana", year = "2012", title = "Un nouveau sch\'{e}ma de partage de secrets publiquement v\'{e}rifiable", booktitle = "Proceedings of the 7th Conference on Network and Information Systems Security (SAR-SSI)", ) @inproceedings(Stadler:1996:PVS:1754495.1754519, author = "M. Stadler", year = "1996", title = "Publicly verifiable secret sharing", booktitle = "Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques", series = "EUROCRYPT'96", publisher = "Springer-Verlag", address = "Berlin, Heidelberg", pages = "190--199", doi = "10.1007/3-540-68339-9\_17", ) @article(myref6, author = "T. Y. Wu and Y. M. Tseng", year = "2011", title = "A pairing-based publicly verifiable secret sharing scheme", journal = "Journal of Systems Science and Complexity", volume = "24", number = "1", pages = "186--194", doi = "10.1007/s11424-011-8408-6", ) @inproceedings(Young:2001:PHD:648118.746760, author = "A. Young and M. Yung", year = "2001", title = "A PVSS as Hard as Discrete Log and Shareholder Separability", booktitle = "Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography", series = "PKC '01", publisher = "Springer-Verlag", address = "London, UK, UK", pages = "287--299", doi = "10.1007/3-540-44586-2\_21", ) @inproceedings(DBLP:conf/snpd/YuKH07, author = "J. Yu and F. Kong and R. Hao", year = "2007", title = "Publicly Verifiable Secret Sharing with Enrollment Ability", booktitle = "SNPD (3)", pages = "194--199", doi = "10.1109/SNPD.2007.435", )