[
    {
        "key": "CG5C32KC",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/CG5C32KC",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/CG5C32KC",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Herranz Sotoca",
            "parsedDate": "2005",
            "numChildren": 0
        },
        "data": {
            "key": "CG5C32KC",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Some Digital Signature Schemes with Collective Signers",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Javier",
                    "lastName": "Herranz Sotoca"
                }
            ],
            "abstractNote": "ABSTRACT Digital signatures are one of the most important consequences of the appearance of public key cryptography, in 1976. These schemes provide authentication, integrity and non-repudiation to digital communications. Some extensions or variations of the concept of digital signature have been introduced, and many specific realizations of these new types of nature schemes have been proposed. In this thesis, we deal with the basic definitions and required security properties of traditional signature schemes and two of its extensions: distributed signature schemes and ring signature schemes. We review the state of the art in these two topics; then we propose and analyze new specific schemes for different scenarios. Namely, we first study distributed signature schemes for general access structures, based on RSA; then we show that such schemes can be used to construct other cryptographic protocols: distributed key distribution schemes and metering schemes. With respect to ring signatures, we opose schemes for both a scenario where the keys are of the Discrete Logarithm type and a scenario where the public keys of users are inferred from their personal identities. Finally, we also propose some distributed ring signature schemes, a kind of schemes which combine the concepts of distributed signatures and ring signatures. We formally prove the security of all these proposals, assuming that some mathematical problems are hard to solve. Specifically, we base the security of our schemes in the hardness of either the RSA problem, or the Discrete Logarithm problem, or the Computational Diffie-Hellman problem.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "2005",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.tesisenxarxa.net/TDX-0518105-161043/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "http://www.scientificcommons.org/2314584",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0000",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "743"
                },
                {
                    "tag": "APLICADA"
                },
                {
                    "tag": "IV"
                },
                {
                    "tag": "MATEMÀTICA"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-06-03T09:41:18Z",
            "dateModified": "2011-12-15T00:09:57Z"
        }
    },
    {
        "key": "PWFT5E8B",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/PWFT5E8B",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/PWFT5E8B",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Douceur",
            "parsedDate": "2002",
            "numChildren": 0
        },
        "data": {
            "key": "PWFT5E8B",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "The Sybil Attack",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "John R",
                    "lastName": "Douceur"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems",
            "conferenceName": "",
            "publisher": "Springer-Verlag",
            "place": "London, UK",
            "date": "2002",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "251–260",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "3-540-44179-4",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "2245",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/1368/items/QW86ENCH"
            },
            "dateAdded": "2009-08-21T11:36:08Z",
            "dateModified": "2011-12-15T00:09:56Z"
        }
    },
    {
        "key": "5UK4R6J7",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/5UK4R6J7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/5UK4R6J7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Daza et al.",
            "parsedDate": "2008",
            "numChildren": 0
        },
        "data": {
            "key": "5UK4R6J7",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Some Protocols Useful on the Internet from Threshold Signature Schemes",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Vanesa",
                    "lastName": "Daza"
                },
                {
                    "creatorType": "author",
                    "firstName": "Javier",
                    "lastName": "Herranz"
                },
                {
                    "creatorType": "author",
                    "firstName": "Germán",
                    "lastName": "Sáez"
                }
            ],
            "abstractNote": "In a threshold signature scheme, a group of players shares some secret information in such a way that only those subsets with a minimum number of players can compute a valid signature. In this paper we propose methods to construct some computationally secure distributed protocols from threshold signature schemes. Namely, we construct metering schemes from threshold non-interactive signature schemes. We also show that threshold deterministic signature schemes can be used to design distributed key distribution schemes. Furthermore, the constructed protocols attain some desirable properties and have useful applications on the Internet. 1",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "2008",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://citeseerx.ist.psu.edu/viewdoc/summary?doi=?doi=10.1.1.118.6303",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "http://www.scientificcommons.org/42416270",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0003",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-06-03T09:43:09Z",
            "dateModified": "2011-12-15T00:09:55Z"
        }
    },
    {
        "key": "4N3EVJBH",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/4N3EVJBH",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/4N3EVJBH",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Georgiou and Shvartsman",
            "parsedDate": "2007",
            "numChildren": 0
        },
        "data": {
            "key": "4N3EVJBH",
            "version": 1,
            "itemType": "book",
            "title": "Do-All Computing in Distributed Systems",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Chryssis",
                    "lastName": "Georgiou"
                },
                {
                    "creatorType": "author",
                    "firstName": "Alex A",
                    "lastName": "Shvartsman"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2007",
            "publisher": "Springer-Verlag New York, Inc.",
            "place": "Secaucus, NJ, USA",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "0387309187",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0003",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-08-21T11:35:57Z",
            "dateModified": "2011-12-15T00:09:54Z"
        }
    },
    {
        "key": "2IGW8XI4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/2IGW8XI4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/2IGW8XI4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Gambetta",
            "parsedDate": "1988",
            "numChildren": 0
        },
        "data": {
            "key": "2IGW8XI4",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "Can We Trust Trust?",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Diego",
                    "lastName": "Gambetta"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Trust: Making and Breaking Cooperative Relations",
            "conferenceName": "",
            "publisher": "Basil Blackwell",
            "place": "",
            "date": "1988",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "213–237",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0240",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-08-21T11:36:02Z",
            "dateModified": "2011-12-15T00:09:53Z"
        }
    },
    {
        "key": "2F3Z9U8A",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/2F3Z9U8A",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/2F3Z9U8A",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Daza et al.",
            "parsedDate": "2007",
            "numChildren": 0
        },
        "data": {
            "key": "2F3Z9U8A",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Cryptographic techniques for mobile ad-hoc networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "V",
                    "lastName": "Daza"
                },
                {
                    "creatorType": "author",
                    "firstName": "J",
                    "lastName": "Herranz"
                },
                {
                    "creatorType": "author",
                    "firstName": "P",
                    "lastName": "Morillo"
                },
                {
                    "creatorType": "author",
                    "firstName": "C",
                    "lastName": "Rafols"
                }
            ],
            "abstractNote": "In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.",
            "publicationTitle": "Computer Networks",
            "publisher": "",
            "place": "",
            "date": "12/2007",
            "volume": "51",
            "issue": "18",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "4938-4950",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Computer Networks",
            "DOI": "10.1016/j.comnet.2007.08.002",
            "citationKey": "",
            "url": "http://linkinghub.elsevier.com/retrieve/pii/S1389128607002253",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "13891286",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0006",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-06-03T09:27:02Z",
            "dateModified": "2011-12-15T00:09:52Z"
        }
    },
    {
        "key": "GFDEAWTB",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/GFDEAWTB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/GFDEAWTB",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/1355/items/XH52UV2P",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "GFDEAWTB",
            "version": 1,
            "parentItem": "XH52UV2P",
            "itemType": "note",
            "note": "<p>including some \"Advances in Distributed Security\" from 2003.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2009-06-02T08:29:29Z",
            "dateModified": "2009-06-02T08:29:45Z"
        }
    },
    {
        "key": "TUSQA6RT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/TUSQA6RT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/TUSQA6RT",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/1355/items/XH52UV2P",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 315367,
                "username": "opscure",
                "name": "Matthew Dillon",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/opscure",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "TUSQA6RT",
            "version": 1,
            "parentItem": "XH52UV2P",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Nick Szabo's Home Page",
            "accessDate": "2009-06-02T08:27:50Z",
            "url": "http://szabo.best.vwh.net/index.html",
            "note": "",
            "contentType": "text/html",
            "charset": "windows-1252",
            "filename": "index.html",
            "md5": null,
            "mtime": null,
            "tags": [],
            "relations": {},
            "dateAdded": "2009-06-02T08:27:50Z",
            "dateModified": "2009-06-02T08:27:50Z"
        }
    },
    {
        "key": "XH52UV2P",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1355,
            "name": "Distributed Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/distributed_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1355/items/XH52UV2P",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/distributed_security/items/XH52UV2P",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 2
        },
        "data": {
            "key": "XH52UV2P",
            "version": 1,
            "itemType": "webpage",
            "title": "Nick Szabo's Home Page",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://szabo.best.vwh.net/index.html",
            "accessDate": "2009-06-02T08:27:49Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-06-02T08:27:49Z",
            "dateModified": "2009-06-02T08:27:49Z"
        }
    }
]