Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

@article{Gennaro2006SecureDK,
  title={Secure Distributed Key Generation for Discrete-Log Based Cryptosystems},
  author={R. Gennaro and Stanis law Jarecki and H. Krawczyk and T. Rabin},
  journal={Journal of Cryptology},
  year={2006},
  volume={20},
  pages={51-83}
}
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol… Expand
498 Citations
Design Efficient Distributed Key Generation For Secure Network Applications over Cloud
  • Highly Influenced
Distributed key generation protocol with a new complaint management strategy
  • 6
Distributed protocols for digital signatures and public key encryption
  • 1
  • PDF
Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices
  • 11
  • PDF
Threshold and Revocation Cryptosystems via Extractable Hash Proofs
  • H. Wee
  • Mathematics, Computer Science
  • EUROCRYPT
  • 2011
  • 17
  • PDF
Distributed Key Generation in the Wild
  • 23
  • PDF
Aggregatable Distributed Key Generation
  • 1
  • PDF
Distributed Private-Key Generators for Identity-Based Cryptography
  • 74
  • Highly Influenced
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 47 REFERENCES
Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems
  • 15
Weakness in Some Threshold Cryptosystems
  • 35
  • PDF
Optimal-resilience proactive public-key cryptosystems
  • 245
Adaptively secure distributed public-key systems
  • 16
  • PDF
Efficient signature generation by smart cards
  • C. Schnorr
  • Mathematics, Computer Science
  • Journal of Cryptology
  • 2004
  • 2,168
  • PDF
Secure INtrusion-Tolerant Replication on the Internet
  • C. Cachin, J. Poritz
  • Computer Science
  • Proceedings International Conference on Dependable Systems and Networks
  • 2002
  • 152
  • PDF
...
1
2
3
4
5
...