A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
GBD Threshold Cryptography with an Application to RSA Key Recovery
[chapter]
2005
Lecture Notes in Computer Science
We also show an application of GBD threshold cryptography to RSA key recovery. ...
Finally, we point out two open problems in the RSA key recovery application. Verifiable Secret Sharing (VSS) scheme. See, for example, [Ped91] for ElGamal and [Sho00] for RSA. ...
We develop both GBD threshold decryption and GBD threshold key generation, and we consider finally an application to key recovery for the RSA cryptosystem. ...
doi:10.1007/11506157_33
fatcat:2ogxuiosvvacdoaph7gh7k6s4m
Relationship between Repeated Sprint Ability and Aerobic Fitness in College Volleyball Players
2019
Universal Journal of Educational Research
These findings suggest that training practices for the development of aerobic components may improve also RSA. ...
After at least 48 hours, subjects performed an RSA test consisting of 10 × 20-m sprints interspersed with 20 seconds of active recovery, to determine the mean sprint time (RSAmean), the best sprint time ...
The aerobic energy system plays a key role in the return to homeostasis during the rest intervals of repeated sprints [6] . ...
doi:10.13189/ujer.2019.070505
fatcat:5esj2x4fcrad7bjbqr5goha5jq
Page 8753 of Mathematical Reviews Vol. , Issue 2002K
[page]
2002
Mathematical Reviews
Applications to the Diffie-Hellman key agreement, ElGamal encryption, and the Nyberg-Rueppel message recovery digital signatures are shown. Comparisons to RSA and ECC are given. ...
The paper introduces the XTR public key system. ...
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
2004
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN '04
In this paper we show an attack on this proposed proactive RSA scheme, in which an admissible threshold of malicious group members can completely recover the group RSA secret key in the course of the lifetime ...
Our attack stems from the fact that the threshold signature protocol which is a part of this proactive RSA scheme leaks some seemingly innocuous information about the secret signature key. ...
For larger values of e, the results of [3, 1] on the RSA key security with partial key exposure imply the following speed-ups in our RSA key recovery attack: If e meets the above criteria, the number ...
doi:10.1145/1029102.1029105
dblp:conf/sasn/JareckiSY04
fatcat:sauilwslizgv7caiaf4praljsu
A Novel Approach For Verifiable Secret Sharing In Proactive Network Using Rsa
2017
Zenodo
In this paper, we present an efficient three-round protocol for VSS. ...
Furthermore, we also demonstrate that one round is sufficient for WSS when n > 4t, and that VSS can be achieved in 1 + " amortized rounds (for any " > 0) when n > 3t. ...
Threshold RSA cryptosystems are in use today, for example, the root CA key for MasterCard/VISA's Secure Electronic Transaction system is protected via a threshold RSA scheme [20] . ...
doi:10.5281/zenodo.581480
fatcat:fxelltio7zgtvfprmque3skvka
A taxonomy for key escrow encryption systems
1996
Communications of the ACM
It may be part of a public key certificate management system or part of a general key management infrastructure. Data Recovery Component (DRC). ...
The USC is a hardware device or software program that provides data encryption and decryption capabilities as well as support for the key escrow function. ...
TIS Commercial Key Escrow. This is a commercial key escrow system for stored data and file transfers. Data recovery is enabled through master keys held by a Data Recovery Center. See Stephen T. ...
doi:10.1145/227234.227239
fatcat:flxn72hk2nd63jx74rmbakbrfe
The Ω key management service
1996
Proceedings of the 3rd ACM conference on Computer and communications security - CCS '96
In this paper we i.ntroduce R, a distributed public key management service for open networks. f'l offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to ...
decrypt messages), and recover private keys, all of which can be subjected to access control policy. ...
Acknowledgements We thank Elizabeth Royer for implementing the WWW interface to 0. ...
doi:10.1145/238168.238184
dblp:conf/ccs/ReiterFLW96
fatcat:2n4bkr245nbp7lq6oa7vbkisua
The Ω key management service*
1996
Journal of Computer Security
In this paper we i.ntroduce R, a distributed public key management service for open networks. f'l offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to ...
decrypt messages), and recover private keys, all of which can be subjected to access control policy. ...
Acknowledgements We thank Elizabeth Royer for implementing the WWW interface to 0. ...
doi:10.3233/jcs-1996-4402
fatcat:2ponnl5vqnembayqlkkm3pmwki
Distributing Security-Mediated PKI
[chapter]
2004
Lecture Notes in Computer Science
key (n u , e u ) n u : product of two large primes gcd (e u, ϕ(n u ))=1 A private key d u d u* e u =1 (mod , ϕ(n u )) Mediated RSA: for each user A public key (n u , e u ) -the same as standard RSA A ...
that revokes the ability of the keyholder to use a private key, instead of revoking the certificate attesting to the corresponding public key mRSA -a Variant of RSA Standard RSA: for each user A public ...
doi:10.1007/978-3-540-25980-0_18
fatcat:uclr7opqtnc4ffbx7kxw5vploq
Validation of the brief version of the Recovery Self-Assessment (RSA-B) using Rasch measurement theory
2015
Psychiatric rehabilitation journal
Currently, the Recovery Self-Assessment (RSA), a 36-item rating scale, is commonly used to assess the uptake of a recovery orientation in clinical services. ...
Objective: In psychiatry, the recovery paradigm is increasingly identified as the overarching framework for service provision. ...
Given the amount of work and other resources invested in the development of recovery-orientated programs and systems of support, a key question is how can we best measure this important outcome? ...
doi:10.1037/prj0000139
pmid:26075526
fatcat:jkzmpzan4bbnfkrryra6jv7h3i
A Comparison of Secret Sharing Schemes Based on Latin Squares and RSA
[article]
2004
arXiv
pre-print
Secret Sharing Schemes allow for the division of keys so that an authorised set of users may access information. ...
., al.] and RSA [Shoup]. These two protocols will be examined in terms of their positive and negative aspects of their secuirty. ...
Furthermore a system of several keys with more than one way for their combination may allow for the unique recovery of a secret. ...
arXiv:cs/0308027v2
fatcat:zwtst65wgnbg3gwmlui4ozhx5u
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
2010
IEEE Transactions on Information Forensics and Security
In this paper, we show an attack on this proposed proactive RSA scheme, in which an admissible threshold of malicious group members can completely recover the group RSA secret key in the course of the ...
Our attack stems from the fact that the threshold signature protocol which is a part of this proactive RSA scheme leaks some seemingly innocuous information about the secret signature key. ...
For larger values of e, the results of [4] , [2] on the RSA key security with partial key exposure imply the following speed-ups in our RSA key recovery attack: If e meets either of the above criteria ...
doi:10.1109/tifs.2010.2058104
fatcat:4qa52da3qbgupigimk4ymajxtm
Distributing security-mediated PKI
2005
International Journal of Information Security
key (n u , e u ) n u : product of two large primes gcd (e u, ϕ(n u ))=1 A private key d u d u* e u =1 (mod , ϕ(n u )) Mediated RSA: for each user A public key (n u , e u ) -the same as standard RSA A ...
that revokes the ability of the keyholder to use a private key, instead of revoking the certificate attesting to the corresponding public key mRSA -a Variant of RSA Standard RSA: for each user A public ...
doi:10.1007/s10207-005-0076-x
fatcat:azy5zijnfvcopjl7vm5nv2slou
Psst, Can You Keep a Secret?
2018
Computer
Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations. ...
For RSA signatures, one can define a two-out-of-three secret-sharing scheme, and a corresponding threshold variant of RSA. 3
Threshold cryptography against single points of failure Conventional cryptographic ...
But what do we gain by using threshold cryptography? For the example of a two-out-of-three threshold RSA signature scheme, consider the case of one share being irrecoverably lost or breached. ...
doi:10.1109/mc.2018.1151029
pmid:29576634
pmcid:PMC5865220
fatcat:zspmxa2zfrcllaypgre3plz6fy
Key Escrow with Elliptic Curve Cryptography – Conceptual Framework for Distributed Mobile Networks
2018
Indonesian Journal of Electrical Engineering and Computer Science
Key escrow centre is established along with the metadata server and the encryption keys are segmented and shared among the multiple sub agents using Shamir threshold sharing scheme. ...
It also eliminates private secret sub key problem and thereby ensuring better security. ...
During the recovery process, KEC randomly choose the key elements equal to or greater that threshold (t). ...
doi:10.11591/ijeecs.v11.i3.pp1060-1067
fatcat:g3hfxwjf2zgutno4cwxcuwoc2i
« Previous
Showing results 1 — 15 out of 3,149 results