Fast distributed RSA key generation for semi-honest and malicious adversaries
From MaRDI portal
Publication:1784098
Recommendations
Cited in
(19)- Protecting distributed primitives against leakage: equivocal secret sharing and more
- On the security of distributed multiprime RSA
- scientific article; zbMATH DE number 1740041 (Why is no real title available?)
- scientific article; zbMATH DE number 16481 (Why is no real title available?)
- Efficient RSA key generation and threshold Paillier in the two-party setting
- Practical statistically-sound proofs of exponentiation in any group
- A new approach to efficient and secure fixed-point computation
- Going beyond dual execution: MPC for functions with efficient verification
- Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
- Multi-party revocation in sovrin: performance through distributed trust
- Efficient RSA key generation and threshold Paillier in the two-party setting
- Efficient, Robust and Constant-Round Distributed RSA Key Generation
- How to verifiably encrypt many bits for an election?
- Toward malicious constant-rate 2PC via arithmetic garbling
- Multiparty generation of an RSA modulus
- scientific article; zbMATH DE number 1775456 (Why is no real title available?)
- What security can we achieve within 4 rounds?
- Reducing the Complexity in the Distributed Computation of Private RSA Keys
- Multiparty generation of an RSA modulus
This page was built for publication: Fast distributed RSA key generation for semi-honest and malicious adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784098)