文摘
英文文摘
声明
Chapter1 Introduction
§1.1 Review the Adversary Capabilities
§1.2 Related Work
Chapter 2 Preliminaries
§2.1 Structures
§2.2 Secrecy Structures, Adversary Structures and Model
§2.3 Basic Tools
§2.3.1 Verifiable Secret Sharing
§2.3.2 E1Gamal Cryptosystem Over A Composite
§2.3.3 Definition of Verifiable Signature Sharing and DDH
Chapter 3 Sharing an RSA Signature
Chapter 4 Conclusion
参考文献
致谢