Secure Distributed Key Generation Protocol Excluding Dishonesty
碩士 === 國立交通大學 === 資訊科學系 === 89 === We discuss the distributed key generation (DKG) protocol for discrete-log based cryptosystems. A t-out-of-n DKG protocol allows n players jointly generate public/private key pairs of the cryptosystems. If more than t play...
Main Authors: | Cheng-Kang Chu, 朱成康 |
---|---|
Other Authors: | Wen-Guey Tzeng |
Format: | Others |
Language: | en_US |
Published: |
2001
|
Online Access: | http://ndltd.ncl.edu.tw/handle/07474140883508005272 |
Similar Items
-
Dishonesty as a signal of trustworthiness: Honesty-Humility and trustworthy dishonesty
by: Karolina A. Ścigała, et al.
Published: (2020-10-01) -
Privacy-Preserving Data Retrieval: Oblivious Transfer and Cast
by: Cheng-Kang Chu, et al.
Published: (2008) -
Disentangling Academic Dishonesty
by: Cherry, Donna J.
Published: (2020) -
Sex, Dishonesty, and Psychotherapy
by: Love, Melanie Nicole
Published: (2019) -
Academic Dishonesty in College
by: Ralph A. Raimi
Published: (2005-08-01)