Distributed protocols allow a cryptographic scheme to distribute its operation among a group of participants (servers). This new concept of cryptosystems was introduced by Desmedt [56]. We consider two different flavours of distributed protocols. One of them considers a distributed model with n parties where all of these parties are honest. The other allows up to t − 1 parties to be faulty. Such cryptosystems are called threshold cryptosystems. The distribution of cryptographic process is based on secret sharing techniques and is usually applicable to public-key cryptosystems. In this thesis we consider distributed protocols for digital signatures and public key encryption schemes. First we consider two flavours of digital signatures - ...
In distributed cryptography independent parties jointly perform some cryptographic task. In the last...
Distributed systems today power almost all online applications. Consequently, a wide range of distri...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhanc-ing ...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin, Kursawe,...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
In distributed cryptography independent parties jointly perform some cryptographic task. In the last...
Distributed systems today power almost all online applications. Consequently, a wide range of distri...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhanc-ing ...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin, Kursawe,...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
In distributed cryptography independent parties jointly perform some cryptographic task. In the last...
Distributed systems today power almost all online applications. Consequently, a wide range of distri...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...