Abstract. The aim of this article is to propose a fully distributed envi-ronment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a price in terms of e±-ciency, we do not want any compromise of the security assumptions that we make. Recently Shoup proposed a practical RSA threshold signature scheme that allows to share the ability to sign between a set of players. This scheme can be used for decryption as well. However, Shoup's pro-tocol assumes a trusted dealer to generate and distribute the keys. This comes from the fact that the scheme needs a special assumption on the RSA modulus and this kind of RSA moduli cannot be easily generated in an e±cient way with many players. Of co...
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the c...
We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold d...
Abstract—We consider the use of threshold signatures in ad-hoc and dynamic groups such as MANETs (“m...
Abstract. The aim of this article is to propose a fully distributed environment for the RSA scheme. ...
International audienceThe aim of this article is to propose a ful ly distributed environment for the...
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We propose a threshold RSA scheme which is as efficient as the fastest previousthreshold RSA scheme ...
The problem of generating an RSA composite in a distributed manner without leaking its factoriza-tio...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
A multisignature scheme is developed here by combining the RSA signature scheme with Shamir's t...
Abstract. Progressing towards an era of ever more small devices with computational power and storage...
This thesis describes the basic theory of multiparty computation (MPC) in addition to a fully functi...
[[abstract]]The concept of universal modulus, meaning that the modulus used by each authorized membe...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the c...
We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold d...
Abstract—We consider the use of threshold signatures in ad-hoc and dynamic groups such as MANETs (“m...
Abstract. The aim of this article is to propose a fully distributed environment for the RSA scheme. ...
International audienceThe aim of this article is to propose a ful ly distributed environment for the...
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We propose a threshold RSA scheme which is as efficient as the fastest previousthreshold RSA scheme ...
The problem of generating an RSA composite in a distributed manner without leaking its factoriza-tio...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
A multisignature scheme is developed here by combining the RSA signature scheme with Shamir's t...
Abstract. Progressing towards an era of ever more small devices with computational power and storage...
This thesis describes the basic theory of multiparty computation (MPC) in addition to a fully functi...
[[abstract]]The concept of universal modulus, meaning that the modulus used by each authorized membe...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the c...
We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold d...
Abstract—We consider the use of threshold signatures in ad-hoc and dynamic groups such as MANETs (“m...