Efficient Generation of Shared RSA Keys (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.00 |
This talk is about how we go about composing privacy properties. This workshop is about protecting privacy, and authentication and privacy are not only functionally in conflict, they also use different kind of technical mechanisms. Now how do we “compose” cryptographic primitives? I’ve put “compose” in inverted commas because it is also used by the operating system guys to describe a separate bundle of issues. If you can come up with a better slogan for what’s going on here then I would very much like to hear it.