The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Consideramos métodos para descriptografia RSA de limite entre agências distribuídas sem qualquer revendedor ou parte confiável. A primeira solução é uma combinação de duas técnicas de [9] e [7] . Ele demonstra a viabilidade de combinar a geração distribuída de chaves e a aplicação da função segura RSA. A segunda solução é outra abordagem que simplifica a distribuição de chaves distribuídas e alivia o fardo de cada acionista em comparação com o primeiro esquema. O último esquema é uma técnica recentemente desenvolvida baseada em [9] e ainda inspirada na falha de protocolo do RSA de Simmons (acreditamos que é muito interessante que um "ataque de falha de protocolo" seja transformado em um método construtivo). Nossa comparação entre esses dois esquemas indica uma nova medida do desempenho de um protocolo criptográfico distribuído que consiste em múltiplos estágios.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Shingo MIYAZAKI, Kouichi SAKURAI, Moti YUNG, "On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer" in IEICE TRANSACTIONS on Fundamentals,
vol. E84-A, no. 5, pp. 1177-1183, May 2001, doi: .
Abstract: We consider methods for threshold RSA decryption among distributed agencies without any dealer or trusted party. The first solution is a combination of two techniques by [9] and [7] . It demonstrates the feasibility of combining the distributed key generation and the RSA secure function application. The second solution is another approach making the distributed key distribution simpler and alleviating a burden of each shareholder in comparison with the first scheme. The latter scheme is newly developed technique based on [9] and further inspired by Simmons' protocol-failure of RSA (we believe that it is very interesting that a "protocol failure attack" be turned into a constructive method). Our comparison between these two schemes indicates a new measure of the performance of a distributed cryptographic protocol that consists of multiple stages.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e84-a_5_1177/_p
Copiar
@ARTICLE{e84-a_5_1177,
author={Shingo MIYAZAKI, Kouichi SAKURAI, Moti YUNG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer},
year={2001},
volume={E84-A},
number={5},
pages={1177-1183},
abstract={We consider methods for threshold RSA decryption among distributed agencies without any dealer or trusted party. The first solution is a combination of two techniques by [9] and [7] . It demonstrates the feasibility of combining the distributed key generation and the RSA secure function application. The second solution is another approach making the distributed key distribution simpler and alleviating a burden of each shareholder in comparison with the first scheme. The latter scheme is newly developed technique based on [9] and further inspired by Simmons' protocol-failure of RSA (we believe that it is very interesting that a "protocol failure attack" be turned into a constructive method). Our comparison between these two schemes indicates a new measure of the performance of a distributed cryptographic protocol that consists of multiple stages.},
keywords={},
doi={},
ISSN={},
month={May},}
Copiar
TY - JOUR
TI - On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1177
EP - 1183
AU - Shingo MIYAZAKI
AU - Kouichi SAKURAI
AU - Moti YUNG
PY - 2001
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E84-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2001
AB - We consider methods for threshold RSA decryption among distributed agencies without any dealer or trusted party. The first solution is a combination of two techniques by [9] and [7] . It demonstrates the feasibility of combining the distributed key generation and the RSA secure function application. The second solution is another approach making the distributed key distribution simpler and alleviating a burden of each shareholder in comparison with the first scheme. The latter scheme is newly developed technique based on [9] and further inspired by Simmons' protocol-failure of RSA (we believe that it is very interesting that a "protocol failure attack" be turned into a constructive method). Our comparison between these two schemes indicates a new measure of the performance of a distributed cryptographic protocol that consists of multiple stages.
ER -