Desmedt, Y; (1998) Some recent research aspects of threshold cryptography. In: Okamoto, E and Davida, G and Mambo, M, (eds.) INFORMATION SECURITY. (pp. 158 - 173). SPRINGER-VERLAG BERLIN
Full text not available from this repository.
In the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Depending from the application the sender or the receiver (or both) need to use a secret key. Often we are not dealing with an individual sender/receiver, but the sender/receiver is an organization. The goal of threshold cryptography is to present practical schemes to solve such problems without the need to use the more general methods of mental games.In this paper we survey some recent research results on this topic. In particular on: DSS based threshold signatures, robust threshold cryptography, threshold cryptography without a trusted dealer, more optimal secret sharing schemes for threshold cryptography, proactive threshold cryptography and its generalizations.
|Title:||Some recent research aspects of threshold cryptography|
|Event:||1st International Workshop on Information Security (ISW 97)|
|Location:||JAPAN ADV INST SCI & TECHNOL, ISHIKAWA, JAPAN|
|Dates:||1997-09-17 - 1997-09-19|
|Keywords:||SHARING SCHEMES, DSS SIGNATURES, SECRET, HOMOMORPHISMS, SYSTEMS|
|UCL classification:||UCL > School of BEAMS > Faculty of Engineering Science > Computer Science|
Archive Staff Only: edit this record