The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 4th ACM Conference on Computer and Communications Security 1997
DOI: 10.1145/266420.266442
|View full text |Cite
|
Sign up to set email alerts
|

Proactive public key and signature systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
127
0

Year Published

1999
1999
2016
2016

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 175 publications
(127 citation statements)
references
References 42 publications
0
127
0
Order By: Relevance
“…There are numerous instantiations of this idea including threshold signatures [7] and proactive signatures [14]. Distribution however is quite costly.…”
Section: The Key Exposure Problemmentioning
confidence: 99%
“…There are numerous instantiations of this idea including threshold signatures [7] and proactive signatures [14]. Distribution however is quite costly.…”
Section: The Key Exposure Problemmentioning
confidence: 99%
“…Early work in the field is due to Boyd [7], Desmedt [19], Croft and Harris [17], Frankel [24], and Desmedt and Frankel [20]. Work in threshold cryptography for discrete-log based cryptosystems includes, for example, Desmedt and Frankel [20], Hwang [32], Pedersen [40], Cerecedo et al [12], Harn [30], Langford [34], Gennaro et al [29], Park and Kurosawa [39], Herzberg et al [31], and Frankel et al [26].…”
Section: Related Workmentioning
confidence: 99%
“…For [21] allow multiple trusted third parties to sign a message using a single signature key while the secret shares held by each signer for constructing the signature key can be refreshed periodically in a way that the signature key (and its corresponding verification key) is kept unchanged.…”
Section: Securing Trusted Third Party's Signaturesmentioning
confidence: 99%