Batch exponentiation: a fast DLP-based signature generation strategy
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Parameter Selection for Server-Aided RSA Computation Schemes
IEEE Transactions on Computers
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
How to Make Replicated Data Secure
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Security and Performance of Server-Aided RSA Computation Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Secure Acceleration of DSS Signatures Using Insecure Server
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Attacks on protocols for server-aided RSA computation
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Server(prover/signer)-aided verification of identity proofs and signatures
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Increasing availability and security of an authentication service
IEEE Journal on Selected Areas in Communications
Fast server-aided secret computation protocols for modular exponentiation
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Hi-index | 0.24 |
The extensive use of networks and distributed systems has increased the need for authentication and digital signatures. In performing authentication on a massive scale, authentication servers that use multiple workstations or PCs are more economical than servers that use one minicomputer or mainframe. However, the establishment of authentication servers with multiple platforms can cause some security problems and increase the cost of key management because all platforms within the server must have the private key of the authentication server. We propose a model for a distributed authentication server, in which one platform keeps the secret information, while the other platforms just do calculations (therefore, no additional key management).