Efficient generation of shared RSA Keys

229Citations
Citations of this article
49Readers
Mendeley users who have this article in their library.

Abstract

We describe efficient techniques for three (or more) parties to jointly generate an RSA key. At the end of the protocol an RSA modulus N = pq is publicly known. None of the parties know the factorization of N. In addition a public encryption exponent is publicly known and each party holds a share of the private exponent that enables threshold decryption. Our protocols are efficient in computation and communication.

Cite

CITATION STYLE

APA

Boneh, D., & Franklin, M. (1997). Efficient generation of shared RSA Keys. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1294, pp. 425–439). Springer Verlag. https://doi.org/10.1007/BFb0052253

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free