Full metadata record
DC FieldValueLanguage
dc.contributor.authorChu, CKen_US
dc.contributor.authorTzeng, WGen_US
dc.date.accessioned2014-12-08T15:43:07Z-
dc.date.available2014-12-08T15:43:07Z-
dc.date.issued2002en_US
dc.identifier.isbn3-540-00164-6en_US
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/11536/29168-
dc.description.abstractIn this paper we discuss the security issue of distributed key generation in a distributed threshold protocol. We identify two subtle flaws in the previously proposed discrete-log based distributed key generation protocols. We propose a discrete-log based distributed key generation protocol that meets the necessary security requirements and has no such flaws.en_US
dc.language.isoen_USen_US
dc.titleDistributed key generation as a component of an integrated protocolen_US
dc.typeArticle; Proceedings Paperen_US
dc.identifier.journalINFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGSen_US
dc.citation.volume2513en_US
dc.citation.spage411en_US
dc.citation.epage421en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000182802800035-
Appears in Collections:Conferences Paper