@inproceedings{Pedersen, author = {Pedersen, Torben Pryds}, title = {A threshold cryptosystem without a trusted party}, booktitle = {Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques}, series = {EUROCRYPT'91}, year = {1991}, isbn = {3-540-54620-0}, location = {Brighton, UK}, pages = {522--526}, numpages = {5}, url = {http://dl.acm.org/citation.cfm?id=1754868.1754929}, acmid = {1754929}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg}, } @inproceedings{Cramer97, author = {Cramer, Ronald and Gennaro, Rosario and Schoenmakers, Berry}, title = {A secure and optimally efficient multi-authority election scheme}, booktitle = {Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques}, series = {EUROCRYPT'97}, year = {1997}, isbn = {3-540-62975-0}, location = {Konstanz, Germany}, pages = {103--118}, numpages = {16}, url = {http://dl.acm.org/citation.cfm?id=1754542.1754554}, acmid = {1754554}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg}, } @inproceedings{Cramer94, author = {Cramer, Ronald and Damg{\aa}rd, Ivan and Schoenmakers, Berry}, title = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols}, booktitle = {Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology}, series = {CRYPTO '94}, year = {1994}, isbn = {3-540-58333-5}, pages = {174--187}, numpages = {14}, url = {http://dl.acm.org/citation.cfm?id=646759.705842}, acmid = {705842}, publisher = {Springer-Verlag}, address = {London, UK, UK}, } @article{shamir1979share, title={How to share a secret}, author={Shamir, Adi}, journal={Communications of the ACM}, volume={22}, number={11}, pages={612--613}, year={1979}, publisher={ACM} } @incollection {ddh, author = {Boneh, Dan}, affiliation = {Stanford University Computer Science Department 94305-9045 Stanford CA 94305-9045 Stanford CA}, title = {The Decision Diffie-Hellman problem}, booktitle = {Algorithmic Number Theory}, series = {Lecture Notes in Computer Science}, editor = {Buhler, Joe}, publisher = {Springer Berlin / Heidelberg}, isbn = {978-3-540-64657-0}, keyword = {Computer Science}, pages = {48-63}, volume = {1423}, url = {http://dx.doi.org/10.1007/BFb0054851}, note = {10.1007/BFb0054851}, year = {1998} } @book{hac, author = {Menezes, Alfred J. and Vanstone, Scott A. and Oorschot, Paul C. Van}, title = {Handbook of Applied Cryptography}, year = {1996}, isbn = {0849385237}, edition = {1st}, publisher = {CRC Press, Inc.}, address = {Boca Raton, FL, USA}, } @book{algebra, author = {Judson, T. W.}, citeulike-article-id = {3080999}, keywords = {bibliografia, review}, posted-at = {2008-08-04 14:16:24}, priority = {2}, publisher = {PWS Pub. Co.}, title = {{Abstract Algebra: Theory and Applications}}, year = {1994} }