Distributed pseudo-random functions and KDCs

M Naor, B Pinkas, O Reingold - International conference on the theory and …, 1999 - Springer
This work describes schemes for distributing between n servers the evaluation of a function f
which is an approximation to a random function, such that only authorized subsets of servers …

Perfectly-secure key distribution for dynamic conferences

C Blundo, A De Santis, A Herzberg, S Kutten… - Advances in Cryptology …, 1993 - Springer
A key distribution scheme for dynamic conferences is a method by which initially an (off-line)
trusted server distributes private individual pieces of information to a set of users. Later any …

Secure applications of Pedersen's distributed key generation protocol

R Gennaro, S Jarecki, H Krawczyk, T Rabin - … , CA, USA, April 13–17, 2003 …, 2003 - Springer
Abstract A Distributed Key Generation (DKG) p rotocol is an essential component of any
threshold cryptosystem. It is used to initialize the cryptosystem and generate its private and …

Non-public key distribution

R Blom - Advances in Cryptology: Proceedings of Crypto 82, 1983 - Springer
Assume that it should be possible to protect messages transmitted in a N-user network by
encryption. The encryption can either be performed by a public-key crypto system or by a …

Efficient and secure conference-key distribution

M Burmester, YG Desmedt - … Cambridge, United Kingdom, April 10–12 …, 1997 - Springer
Key distribution is a major cryptographic component for secure communication. For privacy
data must be encrypted with keys which are distributed securely. In this paper we focus on …

Perfectly secure key distribution for dynamic conferences

C Blundo, A De Santis, A Herzberg, S Kutten… - Information and …, 1998 - Elsevier
In this paper we analyze perfectly secure key distribution schemes for dynamic conferences.
In this setting, anymember of a group oftusers can compute a common key using only his …

On some methods for unconditionally secure key distribution and broadcast encryption

DR Stinson - Selected areas in cryptography, 1997 - Springer
This paper provides an exposition of methods by which a trusted authority can distribute
keys and/or broadcast a message over a network, so that each member of a privileged …

Secure distributed key generation for discrete-log based cryptosystems

R Gennaro, S Jarecki, H Krawczyk, T Rabin - Advances in Cryptology …, 1999 - Springer
Distributed key generation is a main component of threshold cryptosystems and distributed
cryptographic computing in general. Solutions to the distributed generation of private keys …

Cryptography and cryptographic protocols

O Goldreich - Distributed Computing, 2003 - Springer
We survey the paradigms, approaches and techniques used to conceptualize, define and
provide solutions to natural cryptographic problems. We start by presenting some of the …

A conference key distribution system

I Ingemarsson, D Tang, C Wong - IEEE Transactions on …, 1982 - ieeexplore.ieee.org
Encryption is used in a communication system to safeguard information in the transmitted
messages from anyone other than the intended receiver (s). To perform the encryption and …