Abstract | ||
---|---|---|
Distributed cryptography deals with scenarios where a cryptographic operation is performed by a collective of persons. In a distributed signature scheme, a group of players share some secret information in such a way that only authorized subsets of players can compute valid signatures. We propose methods to construct some computationally secure protocols from distributed signature schemes, namely, we construct metering schemes from distributed noninteractive signature schemes. We also show that distributed deterministic signature schemes can be used to design distributed key distribution schemes. In particular, we construct the first metering and distributed key distribution schemes based on the RSA primitive. |
Year | DOI | Venue |
---|---|---|
2004 | 10.1007/s10207-004-0043-y | Int. J. Inf. Sec. |
Keywords | Field | DocType |
computationally secure protocol,cryptographic operation,distributed signatures,metering schemes,cryptography deal,noninteractive signature scheme,valid signature,key distribution scheme,secret information,metering scheme,signature scheme,distributed key distribution schemes,deterministic signature scheme,security protocol,key distribution | Key distribution,Computer security,Computer science,Cryptography,Theoretical computer science,Blind signature,Metering mode,The Internet,Distributed computing | Journal |
Volume | Issue | ISSN |
3 | 2 | 1615-5270 |
Citations | PageRank | References |
3 | 0.37 | 26 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Vanesa Daza | 1 | 211 | 20.62 |
Javier Herranz | 2 | 3 | 0.37 |
Germán Sáez | 3 | 267 | 18.36 |