Filters








3,149 Hits in 4.6 sec

GBD Threshold Cryptography with an Application to RSA Key Recovery [chapter]

Chris Steketee, Jaimee Brown, Juan M. González Nieto, Paul Montague
2005 Lecture Notes in Computer Science  
We also show an application of GBD threshold cryptography to RSA key recovery.  ...  Finally, we point out two open problems in the RSA key recovery application. Verifiable Secret Sharing (VSS) scheme. See, for example, [Ped91] for ElGamal and [Sho00] for RSA.  ...  We develop both GBD threshold decryption and GBD threshold key generation, and we consider finally an application to key recovery for the RSA cryptosystem.  ... 
doi:10.1007/11506157_33 fatcat:2ogxuiosvvacdoaph7gh7k6s4m

Relationship between Repeated Sprint Ability and Aerobic Fitness in College Volleyball Players

Selcen Korkmaz Eryılmaz, Kerimhan Kaynak
2019 Universal Journal of Educational Research  
These findings suggest that training practices for the development of aerobic components may improve also RSA.  ...  After at least 48 hours, subjects performed an RSA test consisting of 10 × 20-m sprints interspersed with 20 seconds of active recovery, to determine the mean sprint time (RSAmean), the best sprint time  ...  The aerobic energy system plays a key role in the return to homeostasis during the rest intervals of repeated sprints [6] .  ... 
doi:10.13189/ujer.2019.070505 fatcat:5esj2x4fcrad7bjbqr5goha5jq

Page 8753 of Mathematical Reviews Vol. , Issue 2002K [page]

2002 Mathematical Reviews  
Applications to the Diffie-Hellman key agreement, ElGamal encryption, and the Nyberg-Rueppel message recovery digital signatures are shown. Comparisons to RSA and ECC are given.  ...  The paper introduces the XTR public key system.  ... 

An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol

Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
2004 Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN '04  
In this paper we show an attack on this proposed proactive RSA scheme, in which an admissible threshold of malicious group members can completely recover the group RSA secret key in the course of the lifetime  ...  Our attack stems from the fact that the threshold signature protocol which is a part of this proactive RSA scheme leaks some seemingly innocuous information about the secret signature key.  ...  For larger values of e, the results of [3, 1] on the RSA key security with partial key exposure imply the following speed-ups in our RSA key recovery attack: If e meets the above criteria, the number  ... 
doi:10.1145/1029102.1029105 dblp:conf/sasn/JareckiSY04 fatcat:sauilwslizgv7caiaf4praljsu

A Novel Approach For Verifiable Secret Sharing In Proactive Network Using Rsa

Vikas Kumar, Prof. O.P. Verma, Deepak Kumar, Sandeep Jain
2017 Zenodo  
In this paper, we present an efficient three-round protocol for VSS.  ...  Furthermore, we also demonstrate that one round is sufficient for WSS when n > 4t, and that VSS can be achieved in 1 + " amortized rounds (for any " > 0) when n > 3t.  ...  Threshold RSA cryptosystems are in use today, for example, the root CA key for MasterCard/VISA's Secure Electronic Transaction system is protected via a threshold RSA scheme [20] .  ... 
doi:10.5281/zenodo.581480 fatcat:fxelltio7zgtvfprmque3skvka

A taxonomy for key escrow encryption systems

Dorothy E. Denning, Dennis K. Branstad
1996 Communications of the ACM  
It may be part of a public key certificate management system or part of a general key management infrastructure. Data Recovery Component (DRC).  ...  The USC is a hardware device or software program that provides data encryption and decryption capabilities as well as support for the key escrow function.  ...  TIS Commercial Key Escrow. This is a commercial key escrow system for stored data and file transfers. Data recovery is enabled through master keys held by a Data Recovery Center. See Stephen T.  ... 
doi:10.1145/227234.227239 fatcat:flxn72hk2nd63jx74rmbakbrfe

The Ω key management service

Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
1996 Proceedings of the 3rd ACM conference on Computer and communications security - CCS '96  
In this paper we i.ntroduce R, a distributed public key management service for open networks. f'l offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to  ...  decrypt messages), and recover private keys, all of which can be subjected to access control policy.  ...  Acknowledgements We thank Elizabeth Royer for implementing the WWW interface to 0.  ... 
doi:10.1145/238168.238184 dblp:conf/ccs/ReiterFLW96 fatcat:2n4bkr245nbp7lq6oa7vbkisua

The Ω key management service*

Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
1996 Journal of Computer Security  
In this paper we i.ntroduce R, a distributed public key management service for open networks. f'l offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to  ...  decrypt messages), and recover private keys, all of which can be subjected to access control policy.  ...  Acknowledgements We thank Elizabeth Royer for implementing the WWW interface to 0.  ... 
doi:10.3233/jcs-1996-4402 fatcat:2ponnl5vqnembayqlkkm3pmwki

Distributing Security-Mediated PKI [chapter]

Gabriel Vanrenen, Sean Smith
2004 Lecture Notes in Computer Science  
key (n u , e u ) n u : product of two large primes gcd (e u, ϕ(n u ))=1 A private key d u d u* e u =1 (mod , ϕ(n u )) Mediated RSA: for each user A public key (n u , e u ) -the same as standard RSA A  ...  that revokes the ability of the keyholder to use a private key, instead of revoking the certificate attesting to the corresponding public key mRSA -a Variant of RSA Standard RSA: for each user A public  ... 
doi:10.1007/978-3-540-25980-0_18 fatcat:uclr7opqtnc4ffbx7kxw5vploq

Validation of the brief version of the Recovery Self-Assessment (RSA-B) using Rasch measurement theory

Skye P. Barbic, Sean A. Kidd, Larry Davidson, Kwame McKenzie, Maria J. O'Connell
2015 Psychiatric rehabilitation journal  
Currently, the Recovery Self-Assessment (RSA), a 36-item rating scale, is commonly used to assess the uptake of a recovery orientation in clinical services.  ...  Objective: In psychiatry, the recovery paradigm is increasingly identified as the overarching framework for service provision.  ...  Given the amount of work and other resources invested in the development of recovery-orientated programs and systems of support, a key question is how can we best measure this important outcome?  ... 
doi:10.1037/prj0000139 pmid:26075526 fatcat:jkzmpzan4bbnfkrryra6jv7h3i

A Comparison of Secret Sharing Schemes Based on Latin Squares and RSA [article]

Liam Wagner
2004 arXiv   pre-print
Secret Sharing Schemes allow for the division of keys so that an authorised set of users may access information.  ...  ., al.] and RSA [Shoup]. These two protocols will be examined in terms of their positive and negative aspects of their secuirty.  ...  Furthermore a system of several keys with more than one way for their combination may allow for the unique recovery of a secret.  ... 
arXiv:cs/0308027v2 fatcat:zwtst65wgnbg3gwmlui4ozhx5u

On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol

Stanisław Jarecki, Nitesh Saxena
2010 IEEE Transactions on Information Forensics and Security  
In this paper, we show an attack on this proposed proactive RSA scheme, in which an admissible threshold of malicious group members can completely recover the group RSA secret key in the course of the  ...  Our attack stems from the fact that the threshold signature protocol which is a part of this proactive RSA scheme leaks some seemingly innocuous information about the secret signature key.  ...  For larger values of e, the results of [4] , [2] on the RSA key security with partial key exposure imply the following speed-ups in our RSA key recovery attack: If e meets either of the above criteria  ... 
doi:10.1109/tifs.2010.2058104 fatcat:4qa52da3qbgupigimk4ymajxtm

Distributing security-mediated PKI

Gabriel Vanrenen, Sean Smith, John Marchesini
2005 International Journal of Information Security  
key (n u , e u ) n u : product of two large primes gcd (e u, ϕ(n u ))=1 A private key d u d u* e u =1 (mod , ϕ(n u )) Mediated RSA: for each user A public key (n u , e u ) -the same as standard RSA A  ...  that revokes the ability of the keyholder to use a private key, instead of revoking the certificate attesting to the corresponding public key mRSA -a Variant of RSA Standard RSA: for each user A public  ... 
doi:10.1007/s10207-005-0076-x fatcat:azy5zijnfvcopjl7vm5nv2slou

Psst, Can You Keep a Secret?

Apostol Vassilev, Nicky Mouha, Luis Brandao
2018 Computer  
Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations.  ...  For RSA signatures, one can define a two-out-of-three secret-sharing scheme, and a corresponding threshold variant of RSA. 3 Threshold cryptography against single points of failure Conventional cryptographic  ...  But what do we gain by using threshold cryptography? For the example of a two-out-of-three threshold RSA signature scheme, consider the case of one share being irrecoverably lost or breached.  ... 
doi:10.1109/mc.2018.1151029 pmid:29576634 pmcid:PMC5865220 fatcat:zspmxa2zfrcllaypgre3plz6fy

Key Escrow with Elliptic Curve Cryptography – Conceptual Framework for Distributed Mobile Networks

B. Sugumar, M. Ramakrishnan
2018 Indonesian Journal of Electrical Engineering and Computer Science  
Key escrow centre is established along with the metadata server and the encryption keys are segmented and shared among the multiple sub agents using Shamir threshold sharing scheme.  ...  It also eliminates private secret sub key problem and thereby ensuring better security.  ...  During the recovery process, KEC randomly choose the key elements equal to or greater that threshold (t).  ... 
doi:10.11591/ijeecs.v11.i3.pp1060-1067 fatcat:g3hfxwjf2zgutno4cwxcuwoc2i
« Previous Showing results 1 — 15 out of 3,149 results