Martin Charles Golumbic, Renu C. Laskar
Discrete Applied Mathematics
New protocols for RSA, Rabin, and DSS VΣS are presented. The protocols are efficient and probably secure and can tolerate the malicious behavior of up to half of the proxies. The RSA VΣS scheme is based on a completely novel approach. The recipient of the signature will simply encrypt using a threshold cryptosystems, a public key whose matching secret key is kept shared at the proxies.
Martin Charles Golumbic, Renu C. Laskar
Discrete Applied Mathematics
David W. Jacobs, Daphna Weinshall, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
A. Gupta, R. Gross, et al.
SPIE Advances in Semiconductors and Superconductors 1990