Abstract
Proactive public key systems where the threshold solutions are further enhanced, are presented by periodic refreshment of the shared function in such a way that the private key is kept unchanged for as long as required, yet breaking of the system requires the attacker to break into several locations in a short period of time. Such solutions are presented for a variety of discrete log based cryptosystems including DSS and Schnorr signatures, ElGamal-like signatures and encryption, and undeniable signatures.
Original language | English |
---|---|
Pages | 100-110 |
Number of pages | 11 |
DOIs | |
State | Published - 1997 |
Externally published | Yes |
Event | Proceedings of the 1997 4th ACM Conference on Computer and Communications Security - Zurich, Switz Duration: 1 Apr 1997 → 4 Apr 1997 |
Conference
Conference | Proceedings of the 1997 4th ACM Conference on Computer and Communications Security |
---|---|
City | Zurich, Switz |
Period | 1/04/97 → 4/04/97 |