Multiplicative non-abelian sharing schemes and their application to threshold cryptography. Desmedt, Y, Crescenzo, G D., & Burmester, M Advances in Cryptology— \textbackslashldots, 1995. 00050Paper bibtex @article{desmedt_multiplicative_1995,
title = {Multiplicative non-abelian sharing schemes and their application to threshold cryptography},
url = {http://link.springer.com/chapter/10.1007/BFb0000421},
journal = {Advances in Cryptology— {\textbackslash}ldots},
author = {Desmedt, Y and Crescenzo, G Di and Burmester, M},
year = {1995},
note = {00050}
}
Downloads: 0
{"_id":"LYaMeDz2yD8Hg2JEi","bibbaseid":"desmedt-crescenzo-burmester-multiplicativenonabeliansharingschemesandtheirapplicationtothresholdcryptography-1995","downloads":0,"creationDate":"2017-04-24T18:33:14.869Z","title":"Multiplicative non-abelian sharing schemes and their application to threshold cryptography","author_short":["Desmedt, Y","Crescenzo, G D.","Burmester, M"],"year":1995,"bibtype":"article","biburl":"http://bibbase.org/zotero/BobWong","bibdata":{"bibtype":"article","type":"article","title":"Multiplicative non-abelian sharing schemes and their application to threshold cryptography","url":"http://link.springer.com/chapter/10.1007/BFb0000421","journal":"Advances in Cryptology— \\textbackslashldots","author":[{"propositions":[],"lastnames":["Desmedt"],"firstnames":["Y"],"suffixes":[]},{"propositions":[],"lastnames":["Crescenzo"],"firstnames":["G","Di"],"suffixes":[]},{"propositions":[],"lastnames":["Burmester"],"firstnames":["M"],"suffixes":[]}],"year":"1995","note":"00050","bibtex":"@article{desmedt_multiplicative_1995,\n\ttitle = {Multiplicative non-abelian sharing schemes and their application to threshold cryptography},\n\turl = {http://link.springer.com/chapter/10.1007/BFb0000421},\n\tjournal = {Advances in Cryptology— {\\textbackslash}ldots},\n\tauthor = {Desmedt, Y and Crescenzo, G Di and Burmester, M},\n\tyear = {1995},\n\tnote = {00050}\n}\n\n","author_short":["Desmedt, Y","Crescenzo, G D.","Burmester, M"],"key":"desmedt_multiplicative_1995","id":"desmedt_multiplicative_1995","bibbaseid":"desmedt-crescenzo-burmester-multiplicativenonabeliansharingschemesandtheirapplicationtothresholdcryptography-1995","role":"author","urls":{"Paper":"http://link.springer.com/chapter/10.1007/BFb0000421"},"downloads":0},"search_terms":["multiplicative","non","abelian","sharing","schemes","application","threshold","cryptography","desmedt","crescenzo","burmester"],"keywords":[],"authorIDs":[],"dataSources":["PRu9F5KuG5QWYnRZL"]}