![Key management / Electronic commerce / RSA / Digital signature / Secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / RSA numbers / Cryptography / Public-key cryptography / Cryptographic protocols Key management / Electronic commerce / RSA / Digital signature / Secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / RSA numbers / Cryptography / Public-key cryptography / Cryptographic protocols](https://www.pdfsearch.io/img/7965597a4f7f5465cf195f2ce5fddfc7.jpg)
| Document Date: 2005-03-04 00:10:28 Open Document File Size: 259,48 KBShare Result on Facebook
City Irvine / / Company CMA / / Country United States / / / Event FDA Phase / / IndustryTerm synchronous communication network / distributed signature protocol / probabilistic polynomial time algorithm / signature reconstruction algorithm / signature protocol / share update protocol / proactive protocol / actual protocol / proactive update protocol / reconstruction protocol / reconstruction algorithm / threshold signature protocol / n-bounded offsetting algorithm / n-bounded-offsetting algorithm / sensor networks / n-bounded reconstruction algorithm / signature generation protocol / binary search / above protocols / distributed protocol / secret-sharing protocol / / Organization Paper Organization / Nitesh Saxena School of Information and Computer Science / / Person Each Mj / Mi / Victor Shoup / Tal Rabin / Mn / Mu / / Position trusted dealer / player / participating player / uncorrupted player / corrupted player / single player / dealer / Private / otherwise player / / Product RSA / Figure / / ProvinceOrState California / / Technology resulting proactive protocol / share update protocol / VSS protocol / actual protocol / signature reconstruction algorithm / signature generation protocol / real protocol / distributed signature protocol / private key / distributed protocol / secret key / previous Update protocol / threshold RSA signature protocol / proactive update protocol / 3.3 Threshold Signature Protocol / cryptography / public key / reconstruction protocol / sharing protocol / 3.4 Proactive Update Protocol / threshold signature protocol / signature protocol / n-bounded offsetting algorithm / secret-sharing protocol / n-bounded reconstruction algorithm / n-bounded-offsetting algorithm / simulation / reconstruction algorithm / probabilistic polynomial time algorithm / above protocols / /
SocialTag |