2010
DOI: 10.1007/978-3-642-11799-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Efficient, Robust and Constant-Round Distributed RSA Key Generation

Abstract: Abstract. We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
30
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(32 citation statements)
references
References 16 publications
0
30
0
Order By: Relevance
“…For a thoroughly analysis of the size of m, the reader is referred to [DM10]. An additive sharing ofã (i) over the integers may be computed based on Paillier encryption with P 0 's keys.…”
Section: B the [Dm10] Biprimality Test: The Two-party Casementioning
confidence: 99%
“…For a thoroughly analysis of the size of m, the reader is referred to [DM10]. An additive sharing ofã (i) over the integers may be computed based on Paillier encryption with P 0 's keys.…”
Section: B the [Dm10] Biprimality Test: The Two-party Casementioning
confidence: 99%
“…A fully distributed public-key system is one where the public (and the distributed private) key are jointly generated by the same servers which end up holding the private key's shares (e.g., via a threshold secret sharing [66]). Efficient distributed key generation (DKG) protocols were put forth for both RSA [12,34,33,26] and discrete-logarithm-based systems [61,41,35,16,43].…”
Section: Introductionmentioning
confidence: 99%
“…In many cases such as privacy-preserving data-mining/statistical learning [5][6][7][8] and distributed generation of cryptographic keys [9], the desired functionality f involves mostly arithmetic operations such as addition, multiplication, division, and exponentiation over the integers and/or the finite fields. More efficient protocols for these basic operations can result in an more efficient protocol for f .…”
Section: Introductionmentioning
confidence: 99%