Fast distributed RSA key generation for semi-honest and malicious adversaries
From MaRDI portal
(Redirected from Publication:1784098)
Recommendations
Cited in
(19)- Multi-party revocation in sovrin: performance through distributed trust
- Multiparty generation of an RSA modulus
- Efficient, Robust and Constant-Round Distributed RSA Key Generation
- Reducing the Complexity in the Distributed Computation of Private RSA Keys
- On the security of distributed multiprime RSA
- What security can we achieve within 4 rounds?
- Multiparty generation of an RSA modulus
- scientific article; zbMATH DE number 1775456 (Why is no real title available?)
- Practical statistically-sound proofs of exponentiation in any group
- Going beyond dual execution: MPC for functions with efficient verification
- Efficient RSA key generation and threshold Paillier in the two-party setting
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Toward malicious constant-rate 2PC via arithmetic garbling
- Efficient RSA key generation and threshold Paillier in the two-party setting
- Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
- scientific article; zbMATH DE number 16481 (Why is no real title available?)
- How to verifiably encrypt many bits for an election?
- scientific article; zbMATH DE number 1740041 (Why is no real title available?)
- A new approach to efficient and secure fixed-point computation
This page was built for publication: Fast distributed RSA key generation for semi-honest and malicious adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784098)