The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Kami mempertimbangkan kaedah untuk penyahsulitan RSA ambang dalam kalangan agensi yang diedarkan tanpa mana-mana peniaga atau pihak yang dipercayai. Penyelesaian pertama ialah gabungan dua teknik oleh [9] dan [7] . Ia menunjukkan kebolehlaksanaan untuk menggabungkan penjanaan kunci yang diedarkan dan aplikasi fungsi selamat RSA. Penyelesaian kedua ialah pendekatan lain yang menjadikan pengagihan kunci teragih lebih mudah dan meringankan beban setiap pemegang saham berbanding dengan skim pertama. Skim terakhir adalah teknik yang baru dibangunkan berdasarkan [9] dan selanjutnya diilhamkan oleh kegagalan protokol RSA Simmons (kami percaya bahawa adalah sangat menarik bahawa "serangan kegagalan protokol" diubah menjadi kaedah yang membina). Perbandingan kami antara kedua-dua skim ini menunjukkan ukuran baharu prestasi protokol kriptografi teragih yang terdiri daripada berbilang peringkat.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Shingo MIYAZAKI, Kouichi SAKURAI, Moti YUNG, "On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer" in IEICE TRANSACTIONS on Fundamentals,
vol. E84-A, no. 5, pp. 1177-1183, May 2001, doi: .
Abstract: We consider methods for threshold RSA decryption among distributed agencies without any dealer or trusted party. The first solution is a combination of two techniques by [9] and [7] . It demonstrates the feasibility of combining the distributed key generation and the RSA secure function application. The second solution is another approach making the distributed key distribution simpler and alleviating a burden of each shareholder in comparison with the first scheme. The latter scheme is newly developed technique based on [9] and further inspired by Simmons' protocol-failure of RSA (we believe that it is very interesting that a "protocol failure attack" be turned into a constructive method). Our comparison between these two schemes indicates a new measure of the performance of a distributed cryptographic protocol that consists of multiple stages.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e84-a_5_1177/_p
Salinan
@ARTICLE{e84-a_5_1177,
author={Shingo MIYAZAKI, Kouichi SAKURAI, Moti YUNG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer},
year={2001},
volume={E84-A},
number={5},
pages={1177-1183},
abstract={We consider methods for threshold RSA decryption among distributed agencies without any dealer or trusted party. The first solution is a combination of two techniques by [9] and [7] . It demonstrates the feasibility of combining the distributed key generation and the RSA secure function application. The second solution is another approach making the distributed key distribution simpler and alleviating a burden of each shareholder in comparison with the first scheme. The latter scheme is newly developed technique based on [9] and further inspired by Simmons' protocol-failure of RSA (we believe that it is very interesting that a "protocol failure attack" be turned into a constructive method). Our comparison between these two schemes indicates a new measure of the performance of a distributed cryptographic protocol that consists of multiple stages.},
keywords={},
doi={},
ISSN={},
month={May},}
Salinan
TY - JOUR
TI - On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1177
EP - 1183
AU - Shingo MIYAZAKI
AU - Kouichi SAKURAI
AU - Moti YUNG
PY - 2001
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E84-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2001
AB - We consider methods for threshold RSA decryption among distributed agencies without any dealer or trusted party. The first solution is a combination of two techniques by [9] and [7] . It demonstrates the feasibility of combining the distributed key generation and the RSA secure function application. The second solution is another approach making the distributed key distribution simpler and alleviating a burden of each shareholder in comparison with the first scheme. The latter scheme is newly developed technique based on [9] and further inspired by Simmons' protocol-failure of RSA (we believe that it is very interesting that a "protocol failure attack" be turned into a constructive method). Our comparison between these two schemes indicates a new measure of the performance of a distributed cryptographic protocol that consists of multiple stages.
ER -