In this paper we discuss the security issue of distributed key generation in a distributed threshold protocol. We identify two subtle flaws in the previously proposed discrete-log based distributed key generation protocols. We propose a discrete-log based distributed key generation protocol that meets the necessary security requirements and has no such flaws.
CITATION STYLE
Chu, C. K., & Tzeng, W. G. (2002). Distributed key generation as a component of an integrated protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2513, pp. 411–421). Springer Verlag. https://doi.org/10.1007/3-540-36159-6_35
Mendeley helps you to discover research relevant for your work.