Loading...
Please wait, while we are loading the content...
Similar Documents
Proactive public key and signature systems (1996).
| Content Provider | CiteSeerX |
|---|---|
| Author | Herzberg, Amir Jakobsson, Markus Jarecki, Stanislaw Krawczyk, Hugo Yung, Moti |
| Abstract | Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptography as a unique enabler for world-wide scale security solutions. On the other hand, these solutions clearly expose the fact that the protection of private keys is a security bottleneck in these sensitive applications. This problem is further worsened in the cases where a single and unchanged private key must be kept secret for very long time (such is the case of certification authority keys, bank and e-cash keys, etc.). One crucial defense against exposure of private keys is offered by threshold cryptography where the private key functions (like signatures or decryption) are distributed among several parties such that a predetermined number of parties must cooperate in order to correctly perform these operations. This protects keys from any single point of failure. An attacker needs to break into a multiplicity of locations before it ca... |
| File Format | |
| Publisher Date | 1996-01-01 |
| Access Restriction | Open |
| Subject Keyword | Proactive Public Key Signature System Private Key Unique Enabler Electronic Commerce Certification Authority Key Predetermined Number Security Bottleneck Long Time Threshold Cryptography E-cash Key Sensitive Application Several Party World-wide Scale Security Solution Unchanged Private Key Public Key Cryptography Single Point Fundamental Role Private Key Function Open Network Crucial Defense Secure Communication |
| Content Type | Text |