Conference paper
Placement of multimedia blocks on zoned disks
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996
New protocols for RSA, Rabin, and DSS VΣS are presented. The protocols are efficient and probably secure and can tolerate the malicious behavior of up to half of the proxies. The RSA VΣS scheme is based on a completely novel approach. The recipient of the signature will simply encrypt using a threshold cryptosystems, a public key whose matching secret key is kept shared at the proxies.
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996
Igor Devetak, Andreas Winter
ISIT 2003
Mario Blaum, John L. Fan, et al.
IEEE International Symposium on Information Theory - Proceedings
Robert Manson Sawko, Malgorzata Zimon
SIAM/ASA JUQ