Back to Results
First PageMeta Content
Key management / Electronic commerce / RSA / Digital signature / Secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / RSA numbers / Cryptography / Public-key cryptography / Cryptographic protocols


Further Simplifications in Proactive RSA Signatures Stanislaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {stasio, nitesh}@ics.uci.edu
Add to Reading List

Document Date: 2005-03-04 00:10:28


Open Document

File Size: 259,48 KB

Share Result on Facebook

City

Irvine / /

Company

CMA / /

Country

United States / /

/

Event

FDA Phase / /

IndustryTerm

synchronous communication network / distributed signature protocol / probabilistic polynomial time algorithm / signature reconstruction algorithm / signature protocol / share update protocol / proactive protocol / actual protocol / proactive update protocol / reconstruction protocol / reconstruction algorithm / threshold signature protocol / n-bounded offsetting algorithm / n-bounded-offsetting algorithm / sensor networks / n-bounded reconstruction algorithm / signature generation protocol / binary search / above protocols / distributed protocol / secret-sharing protocol / /

Organization

Paper Organization / Nitesh Saxena School of Information and Computer Science / /

Person

Each Mj / Mi / Victor Shoup / Tal Rabin / Mn / Mu / /

Position

trusted dealer / player / participating player / uncorrupted player / corrupted player / single player / dealer / Private / otherwise player / /

Product

RSA / Figure / /

ProvinceOrState

California / /

Technology

resulting proactive protocol / share update protocol / VSS protocol / actual protocol / signature reconstruction algorithm / signature generation protocol / real protocol / distributed signature protocol / private key / distributed protocol / secret key / previous Update protocol / threshold RSA signature protocol / proactive update protocol / 3.3 Threshold Signature Protocol / cryptography / public key / reconstruction protocol / sharing protocol / 3.4 Proactive Update Protocol / threshold signature protocol / signature protocol / n-bounded offsetting algorithm / secret-sharing protocol / n-bounded reconstruction algorithm / n-bounded-offsetting algorithm / simulation / reconstruction algorithm / probabilistic polynomial time algorithm / above protocols / /

SocialTag