We describe a means of sharing the DSA signature function, so that two parties can efficiently generate a DSA signature with respect to a given public key but neither can alone. We focus on a certain instantiation that allows a proof of security for concurrent execution in the random oracle model, and that is very practical. We also briefly outline a variation that requires more rounds of communication, but that allows a proof of security for sequential execution without random oracles. © Springer-Verlag Berlin Heidelberg 2001.
CITATION STYLE
MacKenzie, P., & Reiter, M. K. (2001). Two-party generation of DSA signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2139 LNCS, pp. 137–154). Springer Verlag. https://doi.org/10.1007/3-540-44647-8_8
Mendeley helps you to discover research relevant for your work.