Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
@article{Gennaro2006SecureDK, title={Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}, author={R. Gennaro and Stanis law Jarecki and H. Krawczyk and T. Rabin}, journal={Journal of Cryptology}, year={2006}, volume={20}, pages={51-83} }
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol… Expand
Topics from this paper
498 Citations
Design Efficient Distributed Key Generation For Secure Network Applications over Cloud
- 2016
- Highly Influenced
Distributed key generation protocol with a new complaint management strategy
- Computer Science
- Secur. Commun. Networks
- 2016
- 6
Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.
- Computer Science
- CCS
- 2020
- 12
- PDF
Distributed protocols for digital signatures and public key encryption
- Mathematics, Computer Science
- 2016
- 1
- PDF
Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices
- Computer Science
- First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
- 2005
- 11
- PDF
Threshold and Revocation Cryptosystems via Extractable Hash Proofs
- Mathematics, Computer Science
- EUROCRYPT
- 2011
- 17
- PDF
Distributed key generation protocol with hierarchical threshold access structure
- Computer Science
- IET Inf. Secur.
- 2015
- 9
- PDF
Distributed Private-Key Generators for Identity-Based Cryptography
- Computer Science
- SCN
- 2010
- 74
- Highly Influenced
- PDF
References
SHOWING 1-10 OF 47 REFERENCES
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
- Computer Science
- EUROCRYPT
- 1999
- 176
- PDF
Optimal-resilience proactive public-key cryptosystems
- Computer Science
- Proceedings 38th Annual Symposium on Foundations of Computer Science
- 1997
- 245
Efficient signature generation by smart cards
- Mathematics, Computer Science
- Journal of Cryptology
- 2004
- 2,168
- PDF
Secure INtrusion-Tolerant Replication on the Internet
- Computer Science
- Proceedings International Conference on Dependable Systems and Networks
- 2002
- 152
- PDF
A Threshold Cryptosystem without a Trusted Party (Extended Abstract)
- Computer Science
- EUROCRYPT
- 1991
- 776
- PDF