2020
DOI: 10.1007/978-3-030-56877-1_3
|View full text |Cite
|
Sign up to set email alerts
|

Multiparty Generation of an RSA Modulus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…It is assumed that Setup is run honestly at the very beginning of the system. This is a reasonable assumption since there are several works that propose methods to perform the generation of parameters in these algorithms employing distributed computation in multi-party setting (Bowe, Gabizon & Miers, 2017;Chen, Cohen, Doerner, Kondi, Lee, Rosefield & Shelat, 2020). An issuer key includes secret and public parameters of SPS-EQ together with trapdoors for the commitment to be signed.…”
Section: Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is assumed that Setup is run honestly at the very beginning of the system. This is a reasonable assumption since there are several works that propose methods to perform the generation of parameters in these algorithms employing distributed computation in multi-party setting (Bowe, Gabizon & Miers, 2017;Chen, Cohen, Doerner, Kondi, Lee, Rosefield & Shelat, 2020). An issuer key includes secret and public parameters of SPS-EQ together with trapdoors for the commitment to be signed.…”
Section: Constructionmentioning
confidence: 99%
“…Subsequently, it returns the public parameters. Since we assume that Setup is run honestly at the very beginning of the system, we would like to point out that these parameters can be computed by performing distributed computation in multi-party setting (Bowe et al, 2017;Chen et al, 2020). For notational simplicity, in the rest of the paper, we generate only a single time-lock puzzle in Setup algorithm.…”
Section: Constructionmentioning
confidence: 99%
“…In practice, such trusted party can be substituted by an execution of a multi-party computation (MPC) protocol where a set of mutually distrustful jointly generate the RSA modulus. Efficient protocols for this task exist [34,41], but their adoption is cumbersome and error prone. Furthermore, one needs to assume that at least one of the parties involved in this MPC protocol is behaving honestly.…”
Section: Introductionmentioning
confidence: 99%