Back to Results
First PageMeta Content
Key management / Proactive secret sharing / Secret sharing / RSA / Threshold cryptosystem / Verifiable secret sharing / Group signature / Digital signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Cryptographic protocols


An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA
Add to Reading List

Document Date: 2004-09-30 20:04:09


Open Document

File Size: 171,90 KB

Share Result on Facebook

City

Washington / DC / /

Company

RSA / Peer / Computer-Communications Networks / Securing Ad Hoc Networks / Gp / Ad Hoc Wireless Networks / Mobile Ad Hoc Networks / /

Country

United States / /

Currency

USD / /

/

Event

FDA Phase / /

IndustryTerm

proactive share update protocol / signature protocol / admissible / network access control protocol / brute-force search / ary search / update / ad-hoc networks / search procedure / search interval / distributed share update protocol / share update protocol / online certification authorities / Wireless Communications / t-bounded offsetting algorithm / proactive protocol / search range narrows / on-line time-stamping services / above protocol / proactive update protocol / designated / search algorithm / update protocol / on-line communities / share update protocols / above share update protocol / threshold signature protocol / fault-tolerant on-line certification authority / zero-knowledge proof protocols / access control protocol / sensor networks / binary search / polynomial time algorithm / et al. protocol / threshold signature generation protocol / partial update protocol / proof protocols / signature algorithm / signature protocols / signature systems / above systems / /

Organization

Paper Organization / UCLA / Jeong Hyun Yi School of Information / /

Person

Mi / Jeong Hyun / Mb / Tal Rabin / Mj / /

Position

Applications General / editor / manager / trusted dealer / Mp / players Mp / player / corrupted player / player Mp / dealer / corrupt player / /

Product

Herzberg / M1 / M2 / /

ProgrammingLanguage

Hoc / /

Technology

share update protocol / distributed share update protocol / URSA share update protocol / threshold signature generation protocol / above protocol / polynomial time algorithm / search algorithm / Peer-to-Peer / signature protocols / Herzberg et al. protocol / Wireless Communications / 4 2 polynomial time algorithm / URSA protocol / access control protocol / P2P / signature algorithm / signing protocol / private key / two protocols / distributed protocol / secret key / proactive protocol / partial update protocol / above share update protocol / resulting protocol / proactive update protocol / network access control protocol / cryptography / so-called t-bounded offsetting algorithm / URSA proactive share update protocol / public key / update protocol / URSA Ad-Hoc Network Access Control Protocol / t-bounded offsetting algorithm / threshold signature protocol / Mobile Computing / signature protocol / proactive share update protocol / http / URSA threshold signature protocol / zero-knowledge proof protocols / share update protocols / Network Protocols / /

URL

http /

SocialTag