GBD Threshold Cryptography with an Application to RSA Key Recovery


We present protocols for threshold decryption and threshold key generation in the GBD public-key cryptosystem in the “honest-butcurious” setting. These allow GBD computations to be performed in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar to El-Gamal… (More)
DOI: 10.1007/11506157_33


4 Figures and Tables