Date: 2014-02-21 12:47:44Homomorphic encryption Secure multi-party computation Semantic security Distributed key generation Threshold cryptosystem RSA Ciphertext indistinguishability Commitment scheme XTR Cryptography Public-key cryptography Paillier cryptosystem | | An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗Add to Reading ListSource URL: www.eng.biu.ac.ilDownload Document from Source Website File Size: 667,96 KBShare Document on Facebook
|