Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings.
DOI: 10.1109/nca.2004.1347807
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of distributed key generation algorithms using secure sockets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The public value y is taken to be the product of the y i 's that correspond to the shared z i 's since Feldman's VSS has the additional property of revealing y i = g z i . Chronopoulos et al proposed a practical implementation of DKG on a network of computers in Reference [11]. In this scheme, secure sockets are used to create the private channels over the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…The public value y is taken to be the product of the y i 's that correspond to the shared z i 's since Feldman's VSS has the additional property of revealing y i = g z i . Chronopoulos et al proposed a practical implementation of DKG on a network of computers in Reference [11]. In this scheme, secure sockets are used to create the private channels over the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…A model for distributing trusted services (by using threshold cryptography) among a set of servers despite some servers being under control of an attacker has been proposed in [7]. A practical implementation of a distributed key generation (DKG) on a network of computers has been presented in [8]. In this scheme, secure sockets are used to create the private channels over the Internet.…”
Section: Introductionmentioning
confidence: 99%