2011
DOI: 10.1007/978-3-642-17955-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Paillier Cryptosystem without Trusted Dealer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(58 citation statements)
references
References 36 publications
0
58
0
Order By: Relevance
“…Both applications use the cryptographic primitives of the Paillier Threshold Encryption Toolbox [21]. In this library, a centralized mechanism (with a trusted dealer) for threshold key generation [6] is implemented, instead of a distributed Paillier key generation [13]. In our view, this is enough for this prototype implementation.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Both applications use the cryptographic primitives of the Paillier Threshold Encryption Toolbox [21]. In this library, a centralized mechanism (with a trusted dealer) for threshold key generation [6] is implemented, instead of a distributed Paillier key generation [13]. In our view, this is enough for this prototype implementation.…”
Section: Resultsmentioning
confidence: 99%
“…The TAM Service collects the measurements and is responsible for coordinating the distributed key generation [13] for the public-key cryptosystem between itself and a group of L TV agents. These L agents are chosen with a verifiable random selection [7] and participate in both the public-key creation phase and the decryption of the results phase.…”
Section: The Privtam Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…This can be securely implemented by means of an additively homomorphic threshold decryption scheme like [18], which we denote by [.]. Since only outputs are decrypted, the server or any adversary will not learn the inputs.…”
Section: Improved Random User Selectionmentioning
confidence: 99%
“…This set-up phase requires all nodes of the threshold cluster to engage in a distributed key generation protocol [39] for a threshold homomorphic cryptosystem [9]. At the end of this key generation phase, all the nodes of the threshold cluster receive the same public key pk and each gets a share of the private secret key (sk 1 , .…”
Section: Spp-computationmentioning
confidence: 99%