Last update: Sun Oct 15 02:36:41 MDT 2017
@Article{Wee:2011:TRC,
author = "Hoeteck Wee",
title = "Threshold and Revocation Cryptosystems via Extractable
Hash Proofs",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "589--609",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_32",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Jan 21 18:23:52 MST 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_32",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-20465-4",
book-URL = "http://www.springerlink.com/content/978-3-642-20465-4",
fjournal = "Lecture Notes in Computer Science",
}