@dblp

Asynchronous verifiable secret sharing and proactive cryptosystems.

, , , and . ACM Conference on Computer and Communications Security, page 88-97. ACM, (2002)

Links and resources

Tags