Back to Results
First PageMeta Content
Key management / Electronic commerce / RSA / Secret sharing / Digital signature / Verifiable secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / Cryptography / Public-key cryptography / Cryptographic protocols


Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA
Add to Reading List

Document Date: 2008-09-15 00:54:53


Open Document

File Size: 209,25 KB

Share Result on Facebook

City

Irvine / /

Company

CMA / /

Country

United States / /

/

Event

FDA Phase / /

IndustryTerm

synchronous communication network / distributed signature protocol / probabilistic polynomial time algorithm / signature reconstruction algorithm / signature protocol / share update protocol / proactive protocol / actual protocol / proactive update protocol / reconstruction protocol / reconstruction algorithm / threshold signature protocol / n-bounded-offsetting algorithm / n-bounded offsetting algorithm / sensor networks / n-bounded reconstruction algorithm / signature generation protocol / binary search / above protocols / distributed protocol / secret-sharing protocol / /

Organization

Paper Organization / Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science / /

Person

Each Mj / Mi / Victor Shoup / Tal Rabin / Mn / Mu / /

Position

trusted dealer / player / participating player / uncorrupted player / corrupted player / single player / dealer / Private / otherwise player / /

Product

RSA / Figure / /

ProvinceOrState

California / /

Technology

resulting proactive protocol / share update protocol / VSS protocol / actual protocol / signature reconstruction algorithm / signature generation protocol / real protocol / distributed signature protocol / private key / distributed protocol / secret key / previous Update protocol / threshold RSA signature protocol / proactive update protocol / 3.3 Threshold Signature Protocol / cryptography / public key / reconstruction protocol / sharing protocol / 3.4 Proactive Update Protocol / threshold signature protocol / signature protocol / n-bounded offsetting algorithm / secret-sharing protocol / n-bounded reconstruction algorithm / n-bounded-offsetting algorithm / simulation / reconstruction algorithm / probabilistic polynomial time algorithm / above protocols / /

SocialTag