2022
DOI: 10.1007/s00145-021-09395-y
|View full text |Cite
|
Sign up to set email alerts
|

Multiparty Generation of an RSA Modulus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…Proof of sequential work [39,28], trapdoorless VDF or in trustless group of unknown order [22,31] or in MPC-generated RSA groups [26,49] NP-complete problems; Proof-of-Work [32]; witness or PoW encryption [35,38] Proof-of-Space [33]; Equihash, ethash [16,34]; MTP/Itsuku [15,27] [unknown] Proof of storage [37] Trapdoored Moderate/Hard See Section 3.1…”
Section: Easymentioning
confidence: 99%
“…Proof of sequential work [39,28], trapdoorless VDF or in trustless group of unknown order [22,31] or in MPC-generated RSA groups [26,49] NP-complete problems; Proof-of-Work [32]; witness or PoW encryption [35,38] Proof-of-Space [33]; Equihash, ethash [16,34]; MTP/Itsuku [15,27] [unknown] Proof of storage [37] Trapdoored Moderate/Hard See Section 3.1…”
Section: Easymentioning
confidence: 99%
“…Lightweight authentication schemes become highly demanded to implement the mutual authentication in SGS. In the past decades, although many lightweight authentication schemes have been proposed, 4‐33 the majority of them have their own problems. In Gope's scheme, 18 the AG needs to verify the effectiveness of the SMs before communication, which will make the computational complexity linear in the number of SMs.…”
Section: Related Workmentioning
confidence: 99%
“…Chebyshev polynomials cryptosystem over the finite field was first proposed by Kocarev and Tasev, 24 which can be also utilized for authentication scheme designing in SG. Compared with other public key encryption system, such as RSA [25][26][27] and ECC, 6,9,[20][21][22][23] under the same security premise, Chebyshev polynomials cryptosystem has higher efficiency using a shorter key length and shorter verification time. Bayat et al 28 first introduced a chaotic maps based authenticated key exchange protocol for SG.…”
Section: Related Workmentioning
confidence: 99%