Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

  title={Secure Distributed Key Generation for Discrete-Log Based Cryptosystems},
  author={R. Gennaro and Stanis law Jarecki and H. Krawczyk and T. Rabin},
  journal={Journal of Cryptology},
  • R. Gennaro, Stanis law Jarecki, +1 author T. Rabin
  • Published 2006
  • Computer Science
  • Journal of Cryptology
  • A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol… CONTINUE READING
    488 Citations
    Design Efficient Distributed Key Generation For Secure Network Applications over Cloud
    • Highly Influenced
    Distributed key generation protocol with a new complaint management strategy
    • 4
    Distributed protocols for digital signatures and public key encryption
    • 1
    • PDF
    Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices
    • 11
    • PDF
    Threshold and Revocation Cryptosystems via Extractable Hash Proofs
    • H. Wee
    • Mathematics, Computer Science
    • 2011
    • 17
    • PDF
    Distributed Key Generation in the Wild
    • 21
    • PDF
    Distributed Private-Key Generators for Identity-Based Cryptography
    • 74
    • Highly Influenced
    • PDF


    Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems
    • 14
    Weakness in Some Threshold Cryptosystems
    • 35
    • PDF
    Optimal-resilience proactive public-key cryptosystems
    • 245
    Adaptively secure distributed public-key systems
    • 16
    • PDF
    Efficient signature generation by smart cards
    • C. Schnorr
    • Mathematics, Computer Science
    • Journal of Cryptology
    • 2004
    • 2,147
    • PDF
    Secure INtrusion-Tolerant Replication on the Internet
    • C. Cachin, J. Poritz
    • Computer Science
    • Proceedings International Conference on Dependable Systems and Networks
    • 2002
    • 152
    • PDF