Proactive public key systems where the threshold solutions are further enhanced, are presented by periodic refreshment of the shared function in such a way that the private key is kept unchanged for as long as required, yet breaking of the system requires the attacker to break into several locations in a short period of time. Such solutions are presented for a variety of discrete log based cryptosystems including DSS and Schnorr signatures, ElGamal-like signatures and encryption, and undeniable signatures.
|Number of pages||11|
|State||Published - 1997|
|Event||Proceedings of the 1997 4th ACM Conference on Computer and Communications Security - Zurich, Switz|
Duration: 1 Apr 1997 → 4 Apr 1997
|Conference||Proceedings of the 1997 4th ACM Conference on Computer and Communications Security|
|Period||1/04/97 → 4/04/97|