Proactive public key and signature systems

Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung

Research output: Contribution to conferencePaperpeer-review

182 Scopus citations

Abstract

Proactive public key systems where the threshold solutions are further enhanced, are presented by periodic refreshment of the shared function in such a way that the private key is kept unchanged for as long as required, yet breaking of the system requires the attacker to break into several locations in a short period of time. Such solutions are presented for a variety of discrete log based cryptosystems including DSS and Schnorr signatures, ElGamal-like signatures and encryption, and undeniable signatures.

Original languageEnglish
Pages100-110
Number of pages11
DOIs
StatePublished - 1997
Externally publishedYes
EventProceedings of the 1997 4th ACM Conference on Computer and Communications Security - Zurich, Switz
Duration: 1 Apr 19974 Apr 1997

Conference

ConferenceProceedings of the 1997 4th ACM Conference on Computer and Communications Security
CityZurich, Switz
Period1/04/974/04/97

Fingerprint

Dive into the research topics of 'Proactive public key and signature systems'. Together they form a unique fingerprint.

Cite this