Back to Results
First PageMeta Content
Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem


An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗
Add to Reading List

Document Date: 2014-02-21 12:47:44


Open Document

File Size: 667,96 KB

Share Result on Facebook

Company

IBM / /

Country

Israel / Denmark / /

Currency

pence / /

/

Event

FDA Phase / Reorganization / Bankruptcy / /

Facility

MIRACL library / Bar-Ilan University / Alexandra Institute / Aarhus University / /

IndustryTerm

generation algorithm / public-coin protocol / authentication protocol / secure protocols / provable solution / sub-protocols / Σ-protocol / composite generation protocol / real world applications / polynomial-time algorithm / simulatable protocol / real-model protocol / secure party protocol / important tool / generic secure protocols / distributive decryption protocol / distributed key generation protocol / polynomial-time algorithms / distributed decryption protocol / cryptographic protocols / distributed discrete log-based key generation systems / decryption protocol / trial division protocol / concrete protocol / generic protocols / multiplicative key shares protocol / additive / generation protocol / online phase / computing / /

Organization

Aarhus University / Bar-Ilan University / Alexandra Institute / Faculty of Engineering / Department of Computer Science / /

/

Position

following IND-CPA / model / adapting the [BF01] technique / trusted dealer / IND-CPA / /

Product

Franklin / additional / A2 / BF01 / Damg˚ard / DJ01 / DH76 / Gil99 / /

Technology

Fiat-Shamir authentication protocol / following Σ-protocol / second protocol / Damg˚ard-Jurik decryption protocol / two-party protocol / secure two-party protocol / polynomial-time algorithms / real protocol / Paillier encryption / generic secure protocols / key generation protocol / two protocols / distributed protocol / secret key / RSA generation protocol / random encryption / 2.4 Σ-Protocols / ElGamal encryption / following protocols / encryption / following sub-protocols / following two algorithms / BatchedDec protocol / secure party protocol / composite generation protocol / DKeyGen protocol / cryptography / PPT algorithm / key generation algorithm / decryption protocol / public-key encryption / RSA key generation protocol / real-model protocol / distributed key generation protocol / polynomial-time algorithm / 2.2 Public-Key Encryption / multiplicative key shares protocol / LocalTrialDiv protocol / 3-round public-coin protocol / simulation / specified protocol / distributive decryption protocol / proposed protocol / distributed decryption protocol / Diffie-Hellman protocol / /

SocialTag