Efficient, Robust and Constant-Round Distributed RSA Key Generation
暂无分享,去创建一个
[1] Dan Boneh,et al. Experimenting with Shared Generation of RSA Keys , 1999, NDSS.
[2] Helger Lipmaa,et al. On Diophantine Complexity and Statistical Zero-Knowledge Arguments , 2003, ASIACRYPT.
[3] Dan Boneh,et al. Generating a Product of Three Primes with an Unknown Factorization , 1998, ANTS.
[4] M. Rabin. Probabilistic algorithm for testing primality , 1980 .
[5] I. Damgård,et al. Average case error estimates for the strong probable prime test , 1993 .
[6] Moti Yung,et al. Robust efficient distributed RSA-key generation , 1998, STOC '98.
[7] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[8] Ivan Damgård,et al. Linear Integer Secret Sharing and Distributed Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[9] Jan Camenisch,et al. Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.
[10] Ivan Damgård,et al. On the Theory and Practice of Personal Digital Signatures , 2009, IACR Cryptol. ePrint Arch..
[11] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[14] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[15] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[16] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[17] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[18] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[19] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[20] Ivan Damgård,et al. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order , 2002, ASIACRYPT.
[21] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[22] Moti Yung,et al. Robust efficient distributed RSA-key generation , 1998, STOC '98.
[23] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[24] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[25] Aggelos Kiayias,et al. Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.
[26] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.