|
[1]Ajmani, S., Morris, R. and Liskov, B., "A Trusted Third-Party Computation Service.", MIT Laboratory for Computer Science 200 Technology Square, Cambridge, pp. 512-521, 2001. [2]Asokan, N., Shoup, V., and Waidner, M., "Optimistic fair exchange of digital signatures", IEEE Journal on selected areas in communications, Vol. 18, No. 4, April pp. 593–610, 2000. [3]Blakley, G., "Safeguarding cryptographic keys", Proc AFIPS 1979 National Computer Conference, AFIPS Press, New York, pp. 313–317, 1979. [4]Chen, Y. Y., Chen, C. L, and Jan, J. K., "Design of a Fair Proxy Raffle Protocol on the Internet", Computer Standards & Interfaces, Vol. 27, No. 4, pp.417-424, 2005. [5]Chen, Y. Y., Chen, C. L, and Jan, J. K., "A Mobile Ticket System Based on Personal Trusted Device", Wireless Personal Communications, Vol. 40, No. 4, pp.569-578, 2007. [6]Chen, Y. Y., Jan, J. K. and Chen, C. L., "The design of a secure anonymous Internet voting system", Computers & Security, 23, pp.330–337, 2004. [7]Chien, H. Y, and Lin, R. Y., "ID-Based E-Will System using Bilinear Pairings", IWCS2006, Hong Kong, Jun. pp.20-22, 2006. [8]Chien, H. Y. and Tseng, J. K., "A practical (t, n) multi-secret sharing scheme", IEICE Transactions on Fundamentals of Electronics, Communications and Computer 83-A (12), pp.2762–2765, 2000. [9]Franklin, M. K, and Reiter, M. K., "Fair-Exchange with a Semi-Trusted Third Party", Fourth ACM Conference. Computer and Comm. Security, Japan, pp. 1-7, 1997. [10]Harn, L. "Efficient sharing (broadcasting) of multiple secret ", Computers and Digital Techniques 142 (3), pp. 237–240, 1995. [11]Housley, R., Polk, W. and Solo, D., "Internet X.509 public key infrastructure certificate and CRL profile", PKIX Working Group Internet Draft, 2001. [12]Rivest, R. L., Shamir, A. and Adleman, L., "Method for Obtaining Digital Signatures and Public Key Cryptosystems", Communications of the ACM, Vol. 21, No. 2, pp.120-126, 1978. [13]Shamir, A., "How to share a secret", Communications of the ACM, Vol. 22, No.11, pp. 612–613, 1979. [14] Stinson, D. R, "An Explication of secret sharing schemes", Designs, Codes Cryptography, Vol. 2, No.4, pp.357–390, 1992. [15]Susilo, W., Zhang, F. and Mu, Y., "Identity-based strong designated verifier signature schemes", in ACSIP, Vol. 3108, Springer-Verlag, 2004, pp. 313–324, 2004. [16]Tseng, Y. M., "Digital signature of type and application, "Communications of the CCISA, Vol. 7, No.3, pp. 59-67, 2001. [17]Tseng, Y. M., Jan, J. K. and Chien, H. Y., "On the security of generalization of threshold signature and authenticated encryption", IEICE Fund. E84-A (10), pp. 2606–2609, 2001. [18]Tompa, M. and Woll, H., "How to share a secret with cheaters ", Journal of Cryptology, Vol. 1, No.3, pp.133–138, 1988. [19]Wang, C. T., Chang, C. C. and Lin C. H., "Generalization of threshold signature and authenticated encryption for group communications", IEICE Transactions on Fundamentals E83-A (6) 1228–1237, 2000. [20]Yang, C. C., Chang, T. Y. and Hwang, M. S. "A (t, n) multi-secret sharing scheme", Applied Mathematics and Computation, Vol.151, No. 2, pp.483–490, 2004. [21]Zhou, J. and Gollmann, D., "A Fair Non-repudiation Protocol", Proc. IEEE Symp. Research in Security and Privacy, pp. 55-61, 1996. [22]News morning paper, battle of a century of mystery succeeding to the throne, China Cantonese, 2005. http://big5.xinhuanet.com/gate/big5/news.xinhuanet.com/st/2005-05/25/content _2998558.htm [23]Undertake and the trust law office in plan of the property legacy, Hong Kong, 2001, http://www.asset.hk/
|