Semantic Scholar uses AI to extract papers important to this topic.
Roscoe recently showed how HISPs, a class of protocol to allow humans to contribute to the creation of secure authentic channels… Expand The expectancy in authentications that trump vagaries of cracking techniques have surfaced two blurred lines. One lays between… Expand For a number of elliptic curve-based cryptographic protocols, it is useful and sometimes necessary to be able to encode a message… Expand Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the players are sharing a unique secret and… Expand A number p is a safe prime if both p and (p − 1)/2 are prime. This note describes a method of generating safe primes that is… Expand Safe primes are prime numbers of the form p = 2q +1 where q is prime. This note introduces a simple method for doubling the speed… Expand Key exposures bring out very serious problems in security services. Especially, it is more severe in the applications such as… Expand We present a new protocol for efficient distributed computation modulo a shared secret. We further present a protocol to… Expand We present the first efficient statistical zero-knowledge protocols to prove statements such as: - A committed number is a prime… Expand We present efficient zer~knowledge proof systems for quasisafe prime products and other related languages. Quasisafe primes are a… Expand