Encrypting problem instances: Or ... can you take advantage of someone without having to trust him?
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
On hiding information from an oracle
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Smart Cards: The Ultimate Personal Computer
Smart Cards: The Ultimate Personal Computer
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Multi-round passive attacks on server-aided RSA protocols
Proceedings of the 7th ACM conference on Computer and communications security
Parameter Selection for Server-Aided RSA Computation Schemes
IEEE Transactions on Computers
A server assisted authentication protocol for detecting error vectors
ACM SIGOPS Operating Systems Review
Secure mobile communication via identity-based cryptography and server-aided computations
The Journal of Supercomputing
Hi-index | 0.00 |
This paper deals with and gives some solutions to the problem of how a small device such as a smart card can efficiently execute secret computations using computing power of auxiliary devices like (banking-, telephone-,...) terminals which are not necessarily trusted. One of the solutions shows that the RSA signatures can be practically generated by a smart card.