A simplified approach to threshold and proactive RSA
Open Access
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 89-104
- https://doi.org/10.1007/bfb0055722
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Optimal-resilience proactive public-key cryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Efficient generation of shared RSA keysPublished by Springer Nature ,1997
- Witness-based cryptographic program checking and robust function sharingPublished by Association for Computing Machinery (ACM) ,1996
- Robust and Efficient Sharing of RSA FunctionsPublished by Springer Nature ,1996
- Robust Threshold DSS SignaturesPublished by Springer Nature ,1996
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- Group-oriented (t, n) threshold digital signature scheme and digital multisignatureIEE Proceedings - Computers and Digital Techniques, 1994
- How to share a function securelyPublished by Association for Computing Machinery (ACM) ,1994
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987