Two-party generation of DSA signatures

N/ACitations
Citations of this article
44Readers
Mendeley users who have this article in their library.

Abstract

We describe a means of sharing the DSA signature function, so that two parties can efficiently generate a DSA signature with respect to a given public key but neither can alone. We focus on a certain instantiation that allows a proof of security for concurrent execution in the random oracle model, and that is very practical. We also briefly outline a variation that requires more rounds of communication, but that allows a proof of security for sequential execution without random oracles. © Springer-Verlag Berlin Heidelberg 2001.

Cite

CITATION STYLE

APA

MacKenzie, P., & Reiter, M. K. (2001). Two-party generation of DSA signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2139 LNCS, pp. 137–154). Springer Verlag. https://doi.org/10.1007/3-540-44647-8_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free