The optimized key distribution scheme in threshold RSA
Abstract
References
Index Terms
- The optimized key distribution scheme in threshold RSA
Recommendations
Robust and Efficient Sharing of RSA Functions
We present two efficient protocols which implement robust threshold RSA signature schemes, where the power to sign is shared by N players such that any subset of T+1 or more signers can collaborate to produce a valid RSA signature on any given message,...
Threshold Undeniable RSA Signature Scheme
ICICS '01: Proceedings of the Third International Conference on Information and Communications SecurityUndeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almost all the existed schemes are based on discrete logarithm cryptosystems. ...
Provably secure non-interactive key distribution based on pairings
Special issue: Coding and cryptographyWe define a security notion for non-interactive key distribution protocols. We identify an apparently hard computational problem related to pairings, the Bilinear Diffie-Hellman problem (BDH). After extending Sakai, Ohgishi, and Kasahara's pairing based ...
Comments
Information & Contributors
Information
Published In
Sponsors
- ACM: Association for Computing Machinery
- SCS: Shanghai Computer Society
- CCF: China Computer Federation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
- ACM
- SCS
- CCF
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 263Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in