메뉴 건너뛰기




Volumn 2248, Issue , 2001, Pages 310-330

Fully distributed threshold RSA under standard assumptions

Author keywords

Threshold RSA key generation and signature

Indexed keywords

CURRICULA; SECURITY OF DATA;

EID: 84946830669     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45682-1_19     Document Type: Conference Paper
Times cited : (42)

References (39)
  • 4
    • 84958639277 scopus 로고    scopus 로고
    • Efficient Generation of Shared RSA keys
    • Springer-Verlag
    • D. Boneh and M. Franklin. Efficient Generation of Shared RSA keys. In Crypto’97, LNCS 1233, pages 425–439. Springer-Verlag, 1997.
    • (1997) Crypto’97, LNCS 1233 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 6
    • 0013001552 scopus 로고    scopus 로고
    • Proactive Security: Long-term Protection Against Break-ins
    • Spring
    • R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive Security: Long-term Protection Against Break-ins. CryptoBytes, 3(1), Spring 1997.
    • (1997) Cryptobytes , vol.3 , Issue.1
    • Canetti, R.1    Gennaro, R.2    Herzberg, A.3    Naor, D.4
  • 7
    • 84957712291 scopus 로고    scopus 로고
    • An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack
    • Springer-Verlag
    • R. Canetti and S. Goldwasser. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. In Eurorypt’99, LNCS 1592, pages 90–106. Springer-Verlag, 1999.
    • (1999) Eurorypt’99, LNCS 1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2
  • 8
    • 84948954120 scopus 로고    scopus 로고
    • Computing Inverses over a Shared Secret Modulus
    • Springer-Verlag
    • D. Catalano, R. Gennaro, and S. Halevi. Computing Inverses over a Shared Secret Modulus. In Eurocrypt’00, LNCS 1807, pages 190–207. Springer-Verlag, 2000.
    • (2000) Eurocrypt’00 , vol.1807 , pp. 190-207
    • Catalano, D.1    Gennaro, R.2    Halevi, S.3
  • 9
    • 22144433911 scopus 로고    scopus 로고
    • Split Knowledge Generation of RSA Parameters
    • Springer-Verlag
    • C. Cocks. Split Knowledge Generation of RSA Parameters. In Cryptography and Coding: 6th IMA Conference, LNCS 1355, pages 89–95. Springer-Verlag, 1997.
    • (1997) Cryptography and Coding: 6Th IMA Conference , vol.1355 , pp. 89-95
    • Cocks, C.1
  • 11
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System
    • Springer-Verlag
    • I. Damgård and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. In PKC’01, LNCS 1992, pages 119–136. Springer-Verlag, 2001.
    • (2001) PKC’01 , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 12
    • 84945127249 scopus 로고    scopus 로고
    • Practical Threshold RSA Signatures Without a Trusted Dealer
    • Springer-Verlag
    • I. Damgård and M. Koprowski. Practical Threshold RSA Signatures Without a Trusted Dealer. In Eurocrypt’01, LNCS 2045, pages 152–165. Springer-Verlag, 2001.
    • (2001) Eurocrypt’01 , vol.2045 , pp. 152-165
    • Damgård, I.1    Koprowski, M.2
  • 13
    • 85022187530 scopus 로고
    • Shared Generation of Authenticators and Signature
    • Springer-Verlag
    • Y. Desmedt and Y. Frankel. Shared Generation of Authenticators and Signature. In Crypto’91, LNCS 576, pages 457–469. Springer-Verlag, 1991.
    • (1991) Crypto’91 , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 14
    • 0010333125 scopus 로고    scopus 로고
    • Sharing Decryption in the Context of Voting or Lotteries
    • Springer-Verlag
    • P. A. Fouque, G. Poupard, and J. Stern. Sharing Decryption in the Context of Voting or Lotteries. In Financial Crypto’00, LNCS. Springer-Verlag, 2000.
    • (2000) Financial Crypto’00
    • Fouque, P.A.1    Poupard, G.2    Stern, J.3
  • 15
    • 84937439482 scopus 로고    scopus 로고
    • One Round Threshold Discrete-Log Key Generation without Private Channels
    • Springer-Verlag
    • P. A. Fouque and J. Stern. One Round Threshold Discrete-Log Key Generation without Private Channels. In PKC’01, LNCS 1992. Springer-Verlag, 2001.
    • (2001) PKC’01 , vol.1992
    • Fouque, P.A.1    Stern, J.2
  • 16
    • 0031375570 scopus 로고    scopus 로고
    • Optimal Resilience Proactive Public-Key Cryptosystems
    • Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Optimal Resilience Proactive Public-Key Cryptosystems. In FOCS’97, pages 384–393, 1997.
    • (1997) FOCS’97 , pp. 384-393
    • Frankel, Y.1    Gemmell, P.2    Mackenzie, P.3    Yung, M.4
  • 18
    • 0031628726 scopus 로고
    • Robust Efficient Distributed RSA Key Generation
    • Y. Frankel, P. MacKenzie, and M. Yung. Robust Efficient Distributed RSA Key Generation. In STOC’98, pages 663–672, 1995.
    • (1995) STOC’98 , pp. 663-672
    • Frankel, Y.1    Mackenzie, P.2    Yung, M.3
  • 19
    • 84947441722 scopus 로고    scopus 로고
    • Robust and Efficient Sharing of RSA Functions
    • Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and Efficient Sharing of RSA Functions. In Crypto’96, LNCS 1109, pages 157–172. Springer-Verlag, 1996.
    • (1996) Crypto’96 , vol.1109 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 20
    • 84947926543 scopus 로고    scopus 로고
    • Robust Threshold DSS Signatures
    • Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust Threshold DSS Signatures. In Eurocrypt’96, LNCS 1070, pages 425–438. Springer-Verlag, 1996.
    • (1996) Eurocrypt’96 , vol.1070 , pp. 425-438
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 21
    • 49049089688 scopus 로고    scopus 로고
    • Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    • Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In Eurocrypt’99, LNCS 1592, pages 295–310. Springer-Verlag, 1999.
    • (1999) Eurocrypt’99 , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 23
    • 84957104180 scopus 로고    scopus 로고
    • Two Party RSA Key Generation
    • Springer- Verlag
    • N. Gilboa. Two Party RSA Key Generation. In Crypto’99, LNCS 1666. Springer- Verlag, 1999.
    • (1999) Crypto’99, LNCS 1666
    • Gilboa, N.1
  • 24
    • 84959165880 scopus 로고
    • A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
    • 123–128. Springer-Verlag
    • L. C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. In Eurocrypt’88, LNCS 330, pages 123–128. Springer-Verlag, 1988.
    • (1988) Eurocrypt’88 , vol.330
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 25
    • 84937400284 scopus 로고    scopus 로고
    • Improved Methods to Perform Threshold RSA
    • Springer-Verlag
    • B. King. Improved Methods to Perform Threshold RSA. In Asiacrypt’00, LNCS 1976, pages 359–372. Springer-Verlag, 2000.
    • (2000) Asiacrypt’00 , vol.1976 , pp. 359-372
    • King, B.1
  • 26
    • 84958759867 scopus 로고    scopus 로고
    • On Threshold RSA-signing with no dealer
    • Springer-Verlag
    • S. Miyazaki, K. Sakurai, and M. Yung. On Threshold RSA-signing with no dealer. In ICICS’99, LNCS 1787. Springer-Verlag, 1999.
    • (1999) ICICS’99 , vol.1787
    • Miyazaki, S.1    Sakurai, K.2    Yung, M.3
  • 27
    • 85030460443 scopus 로고
    • A Threshold Cryptosystem without a Trusted Party
    • Springer-Verlag
    • T.P. Pedersen. A Threshold Cryptosystem without a Trusted Party. In Eurocrypt’ 91, LNCS 547, pages 522–526. Springer-Verlag, 1991.
    • (1991) Eurocrypt’ 91 , vol.547 , pp. 522-526
    • Pedersen, T.P.1
  • 28
    • 84966198669 scopus 로고
    • On the distribution of pseudoprimes
    • C. Pomerance. On the distribution of pseudoprimes. In Mathematics of Computation, 37(156), pages 587–593, 1981.
    • (1981) Mathematics of Computation, , vol.37 , Issue.156 , pp. 587-593
    • Pomerance, C.1
  • 30
    • 84947809931 scopus 로고    scopus 로고
    • Generation of Shared RSA Keys by Two Parties
    • Springer-Verlag
    • G. Poupard and J. Stern. Generation of Shared RSA Keys by Two Parties. In Asiacrypt’98, LNCS 1514, pages 11–24. Springer-Verlag, 1998.
    • (1998) Asiacrypt’98 , vol.1514 , pp. 11-24
    • Poupard, G.1    Stern, J.2
  • 31
    • 84957796827 scopus 로고    scopus 로고
    • Short Proofs of Knowledge for Factoring
    • Springer-Verlag
    • G. Poupard and J. Stern. Short Proofs of Knowledge for Factoring. In PKC’00, LNCS 1751, pages 147–166. Springer-Verlag, 2000.
    • (2000) PKC’00 , vol.1751 , pp. 147-166
    • Poupard, G.1    Stern, J.2
  • 32
    • 84957689308 scopus 로고    scopus 로고
    • A Simplified Approach to Threshold and Proactive RSA
    • Springer-Verlag
    • T. Rabin. A Simplified Approach to Threshold and Proactive RSA. In Crypto’98, LNCS 1462, pages 89–104. Springer-Verlag, 1998.
    • (1998) Crypto’98 , vol.1462 , pp. 89-104
    • Rabin, T.1
  • 33
    • 84946835719 scopus 로고
    • Finding Four Million Large Random Primes
    • Springer-Verlag
    • R. Rivest. Finding Four Million Large Random Primes. In Crypto’90, LNCS 537, pages 625–626. Springer-Verlag, 1991.
    • (1991) Crypto’90 , vol.537 , pp. 625-626
    • Rivest, R.1
  • 34
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120–126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 36
    • 0018545449 scopus 로고
    • How to Share a Secret
    • November
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22:612–613, November 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 37
    • 84948954277 scopus 로고    scopus 로고
    • Practical Threshold Signatures
    • Springer-Verlag
    • V. Shoup. Practical Threshold Signatures. In Eurocrypt’00, LNCS 1807, pages 207–220. Springer-Verlag, 2000.
    • (2000) Eurocrypt’00 , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 38
    • 84888872516 scopus 로고    scopus 로고
    • Securing Threshold Cryptosystems against Chosen Ciphertext Attack
    • Springer- Verlag, cf. the extended version for the Journal of Cryptology, available at
    • V. Shoup and R. Gennaro. Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In Eurocrypt’98, LNCS 1403, pages 1–16. Springer- Verlag, 1998. cf. the extended version for the Journal of Cryptology, available at http://www.shoup.net/papers/.
    • (1998) Eurocrypt’98 , vol.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.