메뉴 건너뛰기




Volumn 48, Issue 4, 2001, Pages 702-722

Efficient generation of shared RSA keys

Author keywords

Multiparty computation; Primality testing; RSA; Threshold cryptography

Indexed keywords

MULTIPARITY COMPUTATION; PRIMALITY TESTING; RSA; THRESHOLD CRYPTOGRAPHY;

EID: 4243114091     PISSN: 00045411     EISSN: None     Source Type: Journal    
DOI: 10.1145/502090.502094     Document Type: Article
Times cited : (99)

References (41)
  • 1
    • 84947770625 scopus 로고
    • Dynamic-resharing verifiable secret sharing
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • ALON, N., GALIL, Z., AND YUNG, M. 1995. Dynamic-resharing verifiable secret sharing. In Proceedings of the 3rd Annual European Symposium on Algorithms. Lecture Notes in Computer Science, vol. 979. Springer-Verlag, New York, pp. 523-537.
    • (1995) Proceedings of the 3rd Annual European Symposium on Algorithms , vol.979 , pp. 523-537
    • Alon, N.1    Galil, Z.2    Yung, M.3
  • 2
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
    • (Edmonton, Alb., Canada, Aug. 14-16). ACM, New York
    • BAR-ILAN, J., AND BEAVER, D. 1989. Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Proceedings of the 8th Annual ACM Symposium on Principles of Distributed Computing (Edmonton, Alb., Canada, Aug. 14-16). ACM, New York, pp. 201-209.
    • (1989) Proceedings of the 8th Annual ACM Symposium on Principles of Distributed Computing , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 5
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • BENALOH (COHEN), J. 1987. Secret sharing homomorphisms: keeping shares of a secret secret. In Advances in Cryptology - Crypto '86. Lecture Notes in Computer Science, vol. 263. Springer-Verlag, New York, pp. 251-260.
    • (1987) Advances in Cryptology - Crypto '86 , vol.263 , pp. 251-260
    • Benaloh, J.1
  • 6
    • 84947749920 scopus 로고    scopus 로고
    • Generating a product of three primes with an unknown factorization
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • BONEH, D., AND HORWITZ, J. 1998. Generating a product of three primes with an unknown factorization. In Proceedings of the 3rd Algorithmic Number Theory Symposium. Lecture Notes in Computer Science, vol. 1423. Springer-Verlag, New York, pp. 237-251.
    • (1998) Proceedings of the 3rd Algorithmic Number Theory Symposium , vol.1423 , pp. 237-251
    • Boneh, D.1    Horwitz, J.2
  • 7
    • 84948954120 scopus 로고    scopus 로고
    • Computing inverses over a shared secret modulus
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • CATALANO, D., GENNARO, R., AND HALEVI, S. 2000. Computing inverses over a shared secret modulus. In Advances in Cryptology - Eurocrypt 2000. Lecture Notes in Computer Science, vol. 1807. Springer-Verlag, New York, pp. 196-206.
    • (2000) Advances in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 196-206
    • Catalano, D.1    Gennaro, R.2    Halevi, S.3
  • 9
    • 4243147734 scopus 로고    scopus 로고
    • Split knowledge generation of RSA parameters
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • COCKS, C. 1997. Split knowledge generation of RSA parameters. In Clyptography and Coding: 6th IMA Conference. Lecture Notes in Computer Science, vol. 1423. Springer-Verlag, New York, pp. 237-251.
    • (1997) Clyptography and Coding: 6th IMA Conference , vol.1423 , pp. 237-251
    • Cocks, C.1
  • 10
    • 0007414099 scopus 로고
    • On the number of uncanceled elements in the sieve of Eratosthenes
    • DE BRUHN, N. 1950. On the number of uncanceled elements in the sieve of Eratosthenes. Proc. Neder. Akad. Wetensch. 53, pp. 803-812. (Reviewed in LeVeque Reviews in Number Theory, 4, N-28, p.221.)
    • (1950) Proc. Neder. Akad. Wetensch. , vol.53 , pp. 803-812
    • De Bruhn, N.1
  • 11
    • 84857742640 scopus 로고    scopus 로고
    • Reviewed in
    • DE BRUHN, N. 1950. On the number of uncanceled elements in the sieve of Eratosthenes. Proc. Neder. Akad. Wetensch. 53, pp. 803-812. (Reviewed in LeVeque Reviews in Number Theory, 4, N-28, p.221.)
    • LeVeque Reviews in Number Theory , vol.4 , Issue.28 , pp. 221
  • 14
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • DESMEDT, Y., AND FRANKEL, Y. 1992. Shared generation of authenticators and signatures. In Advances in Cryptology - Crypto '91. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, pp. 457-469.
    • (1992) Advances in Cryptology - Crypto '91 , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 15
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on the discrete logarithm
    • ELGAMAL, T. 1985. A public key cryptosystem and a signature scheme based on the discrete logarithm. IEEE Trans. Inf. Theory 31, 4, 469-472.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 16
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • FEIGE, U., FIAT, A., AND SHAMIR, A. 1988. Zero-knowledge proofs of identity. J. Crypt. 1, 77-94.
    • (1988) J. Crypt. , vol.1 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 17
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • FIAT, A., AND SHAMIR, A. 1987. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology - Crypto '86. Lecture Notes in Computer Science, vol. 263. Springer-Verlag, New York, pp. 186-194.
    • (1987) Advances in Cryptology - Crypto '86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 18
    • 0039241746 scopus 로고
    • A practical protocol for large group oriented networks
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • FRANKEL, Y. 1990. A practical protocol for large group oriented networks. In Advances in Cryptology - Eurocrypt '89. Lecture Notes in Computer Science, vol. 434. Springer-Verlag, New York, pp. 56-61.
    • (1990) Advances in Cryptology - Eurocrypt '89 , vol.434 , pp. 56-61
    • Frankel, Y.1
  • 21
    • 0002992068 scopus 로고    scopus 로고
    • Joint encryption and message-efficient secure computation
    • FRANKLIN, M., AND HABER, S. 1996. Joint encryption and message-efficient secure computation. J. Crypt. 9, 217-232.
    • (1996) J. Crypt. , vol.9 , pp. 217-232
    • Franklin, M.1    Haber, S.2
  • 23
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • Lecture Notes in Computer Science. pringer-Verlag, New York
    • GENNARO, R., JARECKI, S., KRAWCZYK, H., AND RABIN, T. 1996. Robust and efficient sharing of RSA functions. In Advances in Cryptology - Crypto '96. Lecture Notes in Computer Science, vol. 1109. pringer-Verlag, New York, pp. 157-172.
    • (1996) Advances in Cryptology - Crypto '96 , vol.1109 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 24
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • GENNARO, R., JARECKI, S., KRAWCZYK, H., AND RABIN, T. 1999. Secure distributed key generation for discrete-log based cryptosystems. In Advances in Cryptology - Eurocrypt '99. Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, New York, pp. 295-310.
    • (1999) In Advances in Cryptology - Eurocrypt '99 , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 25
    • 84957104180 scopus 로고    scopus 로고
    • Two party RSA key generation
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • GILBOA, N. 1999. Two party RSA key generation. In Advances in Cryptology-Crypto '99. Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, New York, pp. 116-129.
    • (1999) Advances in Cryptology-crypto '99 , vol.1666 , pp. 116-129
    • Gilboa, N.1
  • 27
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • GOLDWASSER, S., MICALI, S., AND RACKOFF, C. 1989. The knowledge complexity of interactive proof systems. SIAM J. Comput. 18, 1, 186-208.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 28
    • 85034426869 scopus 로고
    • Strong primes are easy to find
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • GORDON, J. 1985. Strong primes are easy to find. In Advances in Cryptology - Eurocrypt '84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, New York, pp. 216-223.
    • (1985) Advances in Cryptology - Eurocrypt '84 , vol.209 , pp. 216-223
    • Gordon, J.1
  • 29
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • GUILLOU, L., AND QUISQUATER, J. 1988. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In Advances in Cryptology - Eurocrypt '88. Lecture Notes in Computer Science, vol. 330. Springer-Verlag, New York, pp. 123-128.
    • (1988) Advances in Cryptology - Eurocrypt '88 , vol.330 , pp. 123-128
    • Guillou, L.1    Quisquater, J.2
  • 31
    • 84974655726 scopus 로고
    • Secure computation
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • MICALI, S., AND ROGAWAY, P. 1992. Secure computation. In Advances in Cryptology - Crypto '91. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, pp. 392-404.
    • (1992) Advances in Cryptology - Crypto '91 , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 32
    • 85031804925 scopus 로고
    • A modification of the Fiat-shamir scheme
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • OHTA, K., AND OKAMOTO, T. 1990. A modification of the Fiat-Shamir scheme. In Advances in Cryptology-Crypto '88. Lecture Notes in Computer Science, vol. 403. Springer-Verlag, New York, pp. 232-243.
    • (1990) Advances in Cryptology-crypto '88 , vol.403 , pp. 232-243
    • Ohta, K.1    Okamoto, T.2
  • 33
    • 33745972475 scopus 로고
    • Fast signature generation with a Fiat-Shamir-like scheme
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • ONG, H., AND SCHNORR, C. 1991. Fast signature generation with a Fiat-Shamir-like scheme. In Advances in Cryptology - Eurocrypt '90. Lecture Notes in Computer Science, vol. 473. Springer-Verlag, New York, pp. 432-440.
    • (1991) Advances in Cryptology - Eurocrypt '90 , vol.473 , pp. 432-440
    • Ong, H.1    Schnorr, C.2
  • 34
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • PEDERSON, T. 1991. A threshold cryptosystem without a trusted party. In Advances in Cryptology - Eurocrypt 91. Lecture Notes in Computer Science, vol. 547. Springer-Verlag, New York, pp. 522-526.
    • (1991) Advances in Cryptology - Eurocrypt 91 , vol.547 , pp. 522-526
    • Pederson, T.1
  • 35
    • 84947809931 scopus 로고    scopus 로고
    • Generation of shared RSA keys by two parties
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • POUPARD, G., AND STERN, J. 1998. Generation of shared RSA keys by two parties. In Advances in Cryptology - AsiaCrypt '98. Lecture Notes in Computer Science, vol. 1514. Springer-Verlag, New York, pp. 11-24.
    • (1998) Advances in Cryptology - AsiaCrypt '98 , vol.1514 , pp. 11-24
    • Poupard, G.1    Stern, J.2
  • 36
    • 33845432604 scopus 로고
    • Probabilistic algorithm for testing primality
    • RABIN, M. 1980. Probabilistic algorithm for testing primality. J. Num. Theory 12, 128-138.
    • (1980) J. Num. Theory , vol.12 , pp. 128-138
    • Rabin, M.1
  • 37
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • RABIN, T. 1998. A simplified approach to threshold and proactive RSA. In Advances in Cryptology - Crypto '98. Lecture Notes in Computer Science, vol. 1462. Springer-Verlag, New York, pp. 89-104.
    • (1998) In Advances in Cryptology - Crypto '98 , vol.1462 , pp. 89-104
    • Rabin, T.1
  • 38
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A. 1979. How to share a secret. Commun. ACM 22, 11 (Nov.), 612-613.
    • (1979) Commun. ACM , vol.22 , Issue.11 NOV. , pp. 612-613
    • Shamir, A.1
  • 39
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • SHOUP, V. 2000. Practical threshold signatures. In Advances in Cryptology - Eurocrypt 2000. Lecture Notes in Computer Science, vol. 1807. Springer-Verlag, New York, pp. 207-220.
    • (2000) Advances in Cryptology - Eurocrypt 2000 , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 40
    • 0001873077 scopus 로고
    • A fast Monte Carlo test for primality
    • SOLOVAY, R., AND STRASSEN, V. 1977. A fast Monte Carlo test for primality. SIAM J. Comput. 6, 84-85.
    • (1977) SIAM J. Comput. , vol.6 , pp. 84-85
    • Solovay, R.1    Strassen, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.