Optimizing robustness while generating shared secret safe primes

7Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usable in practical settings, so our protocol is robust and efficient in asynchronous, hostile environments. We show that the techniques used for robustness need special care when they must be efficient. Specifically, we show optimizations that minimize the number and size of the proofs of knowledge used. We also develop optimizations based on computer arithmetic algorithms, in particular, precomputation and Montgomery modular multiplication. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Ong, E., & Kubiatowicz, J. (2005). Optimizing robustness while generating shared secret safe primes. In Lecture Notes in Computer Science (Vol. 3386, pp. 120–137). Springer Verlag. https://doi.org/10.1007/978-3-540-30580-4_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free