메뉴 건너뛰기




Volumn 1294, Issue , 1997, Pages 425-439

Efficient generation of shared RSA Keys

Author keywords

Multiparty computation; Primality testing; RSA; Threshold cryptography

Indexed keywords

FACTORIZATION;

EID: 84958639277     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0052253     Document Type: Conference Paper
Times cited : (228)

References (26)
  • 4
    • 0010224921 scopus 로고    scopus 로고
    • "Secret sharing homomorphisms: Keeping shares of a secret secret
    • J. Benaloh (Cohen), "Secret sharing homomorphisms: keeping shares of a secret secret," Crypto '86, 251-260.
    • Crypto , vol.86 , pp. 251-260
    • Benaloh, J.1
  • 5
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. Carter and M. Wegman, "Universal classes of hash functions", J. Comput. Syst. Set. 18 (1979), 143-154.
    • (1979) J. Comput. Syst. Set. , vol.18 , pp. 143-154
    • Carter, J.1    Wegman, M.2
  • 6
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crepeau, and I. Damgird, "Multiparty unconditionally secure protocols," ACM STOC 1988, 11-19.
    • (1988) ACM STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgird, I.3
  • 7
    • 0007414099 scopus 로고
    • On the numbei of uncanceled elements in the sieve of Eratosthenes
    • Reviewed in LeVeque Reviews in Number Theory, Vol. 4, Section N-28, p. 221
    • N. De Biuijn, "On the numbei of uncanceled elements in the sieve of Eratosthenes", Proc. Neder. Akad. Wetensch, vol. 53, 1950, pp. 803-812. Reviewed in LeVeque Reviews in Number Theory, Vol. 4, Section N-28, p. 221.
    • (1950) Proc. Neder. Akad. Wetensch , vol.53 , pp. 803-812
    • De Biuijn, N.1
  • 10
    • 85022187530 scopus 로고    scopus 로고
    • Shared generation of authenticators and signatures
    • Y. Desmedt and Y. Frankel, "Shared generation of authenticators and signatures", Crypto '91, 457-469.
    • Crypto , vol.91 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 12
    • 84990731886 scopus 로고    scopus 로고
    • "How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," Crypto '86, 186-194.
    • Crypto , vol.86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 13
    • 0039241746 scopus 로고    scopus 로고
    • A practical protocol for large group oriented networks
    • Y. Frankel, "A practical protocol for large group oriented networks", Eurocrypt 89, pp. 56-61.
    • Eurocrypt , vol.89 , pp. 56-61
    • Frankel, Y.1
  • 14
    • 0002992068 scopus 로고    scopus 로고
    • Joint encryption and message-efficient secure computation
    • M. Franklin and S. Haber, "Joint encryption and message-efficient secure computation," Journal of Cryptology, 9 (1996), 217-232.
    • (1996) Journal of Cryptology , vol.9 , pp. 217-232
    • Franklin, M.1    Haber, S.2
  • 15
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • R. Fagin, M. Naor, P. Winkler, "Comparing information without leaking it", CACM, Vol 39, No. 5, May 1996, pp. 77-85.
    • (1996) CACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 16
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, "Robust and efficient sharing of RSA functions", Crypto 96, pp. 157-172.
    • Crypto , vol.96 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 18
    • 84969342159 scopus 로고    scopus 로고
    • Strong primes are easy to find
    • J. Gordon, "Strong primes are easy to find", Eurocrypt 84, pp. 216-223
    • Eurocrypt , vol.84 , pp. 216-223
    • Gordon, J.1
  • 19
    • 0001654317 scopus 로고    scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • L. Guillou and J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," Eurocrypt '88, 123-128.
    • Eurocrypt , vol.88 , pp. 123-128
    • Guillou, L.1    Quisquater, J.2
  • 20
    • 0004794571 scopus 로고    scopus 로고
    • A modification of the Fiat-Shamir scheme
    • K. Ohta and T. Okamoto, "A modification of the Fiat-Shamir scheme," Crpto '88, 232-243.
    • Crpto , vol.88 , pp. 232-243
    • Ohta, K.1    Okamoto, T.2
  • 21
    • 0004743525 scopus 로고    scopus 로고
    • Fast signature generation with a Fiat Shamir-like scheme
    • H. Ong and C. Schnorr, "Fast signature generation with a Fiat Shamir-like scheme," Eurocrypt '90, 432-440.
    • Eurocrypt , vol.90 , pp. 432-440
    • Ong, H.1    Schnorr, C.2
  • 22
    • 0000135789 scopus 로고    scopus 로고
    • A threshold cryptosystem without a trusted party
    • T. Pederson, "A threshold cryptosystem without a trusted party," Proceedings of Eurocrypt 91, pp. 522-526.
    • Proceedings of Eurocrypt , vol.91 , pp. 522-526
    • Pederson, T.1
  • 23
    • 33845432604 scopus 로고
    • Probabilistic algorithm for testing primality
    • M. Rabin, "Probabilistic algorithm for testing primality", J. of Number Theory, vol. 12, pp. 128-138, 1980.
    • (1980) J. Of Number Theory , vol.12 , pp. 128-138
    • Rabin, M.1
  • 24
  • 25
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and J. Carter, "New hash functions and their use in authentication and set equality", J. Comput. Syst. Sci. 22 (1981), 265-279.
    • (1981) J. Comput. Syst. Sci. , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, J.2
  • 26
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao, "How to generate and exchange secrets", FOCS 1986, pp. 162-167.
    • (1986) FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.