Back to Results
First PageMeta Content
Digital signature / Key / Paillier cryptosystem / Prime number / Threshold cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / RSA


RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,
Add to Reading List

Document Date: 2013-06-06 21:32:07


Open Document

File Size: 257,39 KB

Share Result on Facebook

City

Bristol / /

Company

Fiat / /

Country

United Kingdom / /

/

Event

FDA Phase / /

Facility

Merchant Venturers Building / University of Bristol / /

IndustryTerm

public protocol / n-out-of-n shared key generation protocol / share-refreshing protocol / Internet card game / public key infrastructure / bank / elegant solution / threshold systems / public algorithm / decryption algorithm / generation protocol / Internet Card Game protocols / computing / n-out-of-n key generation protocol / /

Organization

Pi / University of Bristol / Distributed Certificate Authority / Parallel Trial Division / Computation Protocols / /

Person

Rabin / Ron Rivest / N . Clearly / Adi Shamir / /

Position

author / manager / trusted dealer / dealer / Private / /

Product

Cowon D2+ Portable Audio Device / Franklin / this / /

ProvinceOrState

California / /

Technology

encryption / 2.1 Dealing Algorithm / Share Verification Algorithm / Cryptography / public key infrastructure / 2.5 Share Combining Algorithm / public key / 2.2 Subset Presigning Algorithm / 2.3 Signature Share Generation Algorithm / 7.3 Network protocol / PKI / 4.2 Benaloh Protocol / RSA encryption / n-out-of-n shared key generation protocol / key generation protocol / share-refreshing protocol / Private Key / 3.3 RSA Algorithm / secret key / 4.3 BGW Protocol / n-out-of-n key generation protocol / decryption algorithm / Digital Signature / 5 Shared RSA Secret Keys Generation Protocol / Elgamal encryption / Internet Card Game protocols / Elgamal algorithm / /

SocialTag