Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Optimal-resilience proactive public-key cryptosystems
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Hi-index | 0.00 |
In this paper, we introduce an intrusion-tolerant authorization and authentication scheme in distributed environments, by the utilization of a secure multi-party computation scheme by virtue of Feldman's (t + 1, n) VSS to perform the warrant authorization. In this way, a warrant can be obtained in a distributed fashion in which any k of registration severs are required to perform the computation. The n segments of the private key of the registration severs set---which are spread across n registration severs---do not have to be recombined on a single machine to perform a warrant authorization. Since k , the requirement that only k segments are needed inherently provides system reliability.