Attacks on Shamir's “RSA for paranoids”
Information Processing Letters
Journal of Computer Security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Finding Four Million Large Random Primes
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Hand-held computers can be better smart cards
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Securing Agent Based Architectures
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Crypto-based identifiers (CBIDs): Concepts and applications
ACM Transactions on Information and System Security (TISSEC)
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Architecture of a server-aided signature service (SASS) for mobile networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Cryptanalysis of server-aided RSA key generation protocols at MADNES 2005
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
New methods of secure outsourcing of scientific computations
The Journal of Supercomputing
Hi-index | 0.00 |
We show how to efficiently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key generation work is offloaded onto the server. However, the server learns no information about the key it helped generate. We experiment with our techniques and show they result in up to a factor of 5 improvement in key generation time. The resulting RSA key looks like an RSA key for paranoids. It can be used for encryption and key exchange, but cannot be used for signatures.