Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

@article{Gennaro2006SecureDK,
  title={Secure Distributed Key Generation for Discrete-Log Based Cryptosystems},
  author={Rosario Gennaro and Stanis law Jarecki and Hugo Krawczyk and Tal Rabin},
  journal={Journal of Cryptology},
  year={2006},
  volume={20},
  pages={51-83}
}
  • Rosario Gennaro, Stanis law Jarecki, +1 author Tal Rabin
  • Published in Journal of Cryptology 2006
  • Mathematics, Computer Science
  • A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 396 CITATIONS

    Contextual Identity in Practice Attribute-based Authentication and Signing on Smartphones

    VIEW 9 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Fair blind threshold signatures in wallet with observers

    VIEW 10 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    A Blockchain Traceable Scheme with Oversight Function

    VIEW 4 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain

    VIEW 4 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Towards Scalable Threshold Cryptosystems

    VIEW 4 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band

    VIEW 11 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    1997
    2020

    CITATION STATISTICS

    • 59 Highly Influenced Citations

    • Averaged 30 Citations per year from 2017 through 2019

    • 86% Increase in citations per year in 2019 over 2018

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 15 REFERENCES

    Efficient signature generation by smart cards

    Advances in Cryptology — EUROCRYPT ’97

    • Walter Fumy
    • Computer Science
    • Lecture Notes in Computer Science
    • 1997

    Optimal-resilience proactive public-key cryptosystems

    E79-A(1):86–93

    • C. Park, K. Kurosawa. New ElGamal Type Threshold Digital Signa Fundamentals
    • January
    • 1996

    Group oriented (t

    • L. Harn
    • n) digital signature scheme. IEE Proc.Comput.Digit.Tech, 141(5):307–313, Sept
    • 1994