×
In this paper, we examine the problem of obtaining adaptively secure distributed public-key systems. Adaptive security for distributed public-key systems has ...
Specifically, we construct distributed discrete-log-based and RSA-based public-key systems secure against an adaptive adversary. We also extend the discrete-log ...
Jan 14, 2003 · When attacking a distributed protocol, an adaptive adversary is able to decide its actions (e.g., which parties to corrupt) at any time ...
Publications. Adaptively-Secure Distributed Public-Key Systems. Yair Frankel. Philip D. MacKenzie · Moti Yung. ESA '99: Proceedings of the 7th Annual European ...
Proving security of cryptographic protocols against adaptive adversaries is a fundamental problem in cryptography. In this paper we consider "distributed public ...
This paper considers "distributed public-key systems" which are secure against an adaptive adversary and proposes a solution to this problem.
An efficient threshold public key cryptosystem secure against adaptive chosen- ciphertext attacks. ... Adaptively-secure distributed public-key systems. In ESA, ...
In this paper we examine the problem of obtaining adaptive security for distributed public-key systems. None of the known implementations of distributed ...
In this paper, we consider distributed public-key systems which are secure against an adaptive adversary. Specifically, we construct distributed discrete-log- ...
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ...