We present a new distributed, group ElGamal public key generation algorithm which also permits maintenance of a group-speci c, dynamic, individual ElGamal public key in-frastructure. We parameterize the group with a time-varying quantity that serves as a distributed mechanism for control-ling key generation privilege. Our scheme can be viewed as an alternative to polynomial schemes where, at the time of the secret construction step, there has to be a third party or a black box to combine the shares. Also, in polynomial schemes, at the time of combining, the individual shares of the secret have to be revealed to the third party. In our scheme, the common secret can be generated without ever exposing the individual shares constructing it. We ...
[[abstract]]In this paper, we are interested in those secure applications that have the one-to-many ...
AbstractMany group-oriented applications in distributed systems, such as teleconferencing and cooper...
Key management is an essential cryptographic primitive upon which other security primitives are buil...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
in distributed system it is sometimes necessary for users to share the power to use a cryptosystem. ...
Modern multi-user communication systems, including popular instant messaging tools, social network p...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
We present a new class of distributed key generation and recoveryalgorithms suitable for group commu...
Abstract. Modern multi-user communication systems, including popular instant messaging tools, social...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
The growth of the Internet inspires lots of new network applications, and many of them are based on ...
To accomplish secure group communication, it is essential to share a unique cryptographic key among ...
We focus on the problem of distributing key updates in secure dynamic groups. Due to changes in grou...
Abstract Generating a distributed key, where a constant fraction of the players can reconstruct the ...
[[abstract]]In this paper, we are interested in those secure applications that have the one-to-many ...
AbstractMany group-oriented applications in distributed systems, such as teleconferencing and cooper...
Key management is an essential cryptographic primitive upon which other security primitives are buil...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
in distributed system it is sometimes necessary for users to share the power to use a cryptosystem. ...
Modern multi-user communication systems, including popular instant messaging tools, social network p...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
We present a new class of distributed key generation and recoveryalgorithms suitable for group commu...
Abstract. Modern multi-user communication systems, including popular instant messaging tools, social...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
The growth of the Internet inspires lots of new network applications, and many of them are based on ...
To accomplish secure group communication, it is essential to share a unique cryptographic key among ...
We focus on the problem of distributing key updates in secure dynamic groups. Due to changes in grou...
Abstract Generating a distributed key, where a constant fraction of the players can reconstruct the ...
[[abstract]]In this paper, we are interested in those secure applications that have the one-to-many ...
AbstractMany group-oriented applications in distributed systems, such as teleconferencing and cooper...
Key management is an essential cryptographic primitive upon which other security primitives are buil...