We present two new, highly efficient, protocols for securely generating a distributed RSA key pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously secure. Both are constant round and do not rely on any specific number-theoretic assumptions and improve significantly over the state-of-the-art by allowing a slight leakage (which we show to not affect security). For our maliciously secure protocol our most significant improvement comes from executing most of the protocol in a ``strong\u27\u27 semi-honest manner and then doing a single, light, zero-knowledge argument of correct execution. We introduce other significant improvements as well. One such improvement arrives in showing that certain, limited le...
In distributed symmetric-key encryption (DiSE), a set of n distributed servers share a key (or key ...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Can bits of an RSA public key leak information about design and implementation choices such as the p...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
The problem of generating an RSA composite in a distributed manner without leaking its factoriza-tio...
Secure distributed generation of RSA moduli (e.g., generating $N=pq$ where none of the parties learn...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
Private set intersection (PSI) allows two parties, who each hold a set of items, to compute the inte...
International audienceWe analyze the security and the efficiency of interactive protocols where a cl...
Abstract. The aim of this article is to propose a fully distributed environment for the RSA scheme. ...
International audienceThe aim of this article is to propose a ful ly distributed environment for the...
Abstract. The aim of this article is to propose a fully distributed envi-ronment for the RSA scheme....
Security is one of the most important concern to the information and data sharing for companies, ban...
This thesis describes the basic theory of multiparty computation (MPC) in addition to a fully functi...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
In distributed symmetric-key encryption (DiSE), a set of n distributed servers share a key (or key ...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Can bits of an RSA public key leak information about design and implementation choices such as the p...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
The problem of generating an RSA composite in a distributed manner without leaking its factoriza-tio...
Secure distributed generation of RSA moduli (e.g., generating $N=pq$ where none of the parties learn...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
Private set intersection (PSI) allows two parties, who each hold a set of items, to compute the inte...
International audienceWe analyze the security and the efficiency of interactive protocols where a cl...
Abstract. The aim of this article is to propose a fully distributed environment for the RSA scheme. ...
International audienceThe aim of this article is to propose a ful ly distributed environment for the...
Abstract. The aim of this article is to propose a fully distributed envi-ronment for the RSA scheme....
Security is one of the most important concern to the information and data sharing for companies, ban...
This thesis describes the basic theory of multiparty computation (MPC) in addition to a fully functi...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
In distributed symmetric-key encryption (DiSE), a set of n distributed servers share a key (or key ...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Can bits of an RSA public key leak information about design and implementation choices such as the p...