Efficient generation of shared RSA keys
- 1 July 2001
- journal article
- Published by Association for Computing Machinery (ACM) in Journal of the ACM
- Vol. 48 (4), 702-722
- https://doi.org/10.1145/502090.502094
Abstract
We describe efficient techniques for a number of parties to jointly generate an RSA key. At the end of the protocol an RSA modulus N = pq is publicly known. None of the parties know the factorization of N . In addition a public encryption exponent is publicly known and each party holds a share of the private exponent that enables threshold decryption. Our protocols are efficient in computation and communication. All results are presented in the honest but curious scenario (passive adversary).Keywords
This publication has 13 references indexed in Scilit:
- Robust efficient distributed RSA-key generationPublished by Association for Computing Machinery (ACM) ,1998
- Joint encryption and message-efficient secure computationJournal of Cryptology, 1996
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Non-cryptographic fault-tolerant computing in constant number of rounds of interactionPublished by Association for Computing Machinery (ACM) ,1989
- Zero-knowledge proofs of identityJournal of Cryptology, 1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Probabilistic algorithm for testing primalityJournal of Number Theory, 1980
- How to share a secretCommunications of the ACM, 1979
- A Fast Monte-Carlo Test for PrimalitySIAM Journal on Computing, 1977