Efficient generation of shared RSA keys (1997)

Cached

Download Links

by Dan Boneh , Matthew Franklin
Venue:Advances in Cryptology -- CRYPTO 97
Citations:124 - 4 self

Documents Related by Co-Citation

670 Completeness theorems for noncryptographic fault-tolerant distributed computation – M Ben-Or, S Goldwasser, A Wigderson
79 Robust and Efficient Sharing of RSA Functions – Rosario Gennaro, Stanislav Jarecki, Hugo Krawczyk, Tal Rabin - 1996
1754 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
55 Robust Efficient Distributed RSA-Key Generation – Yair Frankel, Philip D. Mackenzie, Moti Yung
202 Practical Threshold Signatures – Victor Shoup - 1999
429 Multi-party unconditionally secure protocols – D Chaum, C Crepeau, I Damgaard
389 Security and Composition of Multi-party Cryptographic Protocols – Ran Canetti - 1998
830 How To Prove Yourself: Practical Solutions to Identification and Signature Problems – Amos Fiat, Adi Shamir - 1987
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
188 A threshold cryptosystem without a trusted party – T P Pedersen - 1991
83 A Simplified Approach to Threshold and Proactive RSA – Tal Rabin
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
19 E#cient generation of shared RSA keys – D Boneh, M Franklin - 1997
556 How to generate and exchange secrets – A Yao - 1986
470 A randomized protocol for signing contracts – Michael Ben-or, Oded Goldreich, Silvio Micali, Ronald, L. Rivest - 1985
198 Oblivious transfer and polynomial evaluation – M Naor, B Pinkas - 1999
415 Private Information Retrieval – Benny Chor, Oded Goldreich, Eyal Kushilevitz, Madhu Sudan - 1997
92 Threshold cryptography – Y G Desmedt - 1994
122 Robust Threshold DSS Signatures – Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin - 1996