@inproceedings{91a0edbf575d47e0a0cd34f795331294,
title = "Efficient RSA key generation and threshold Paillier in the two-party setting",
abstract = "The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior in the two party setting. Our second contribution is a complete Paillier [37] threshold encryption scheme in the two-party setting with security against malicious behavior. Our RSA key generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed decryption protocol for decrypting according to Paillier.",
author = "Carmit Hazay and Mikkelsen, {Gert L{\ae}ss{\o}e} and Tal Rabin and Tomas Toft",
year = "2012",
doi = "https://doi.org/10.1007/978-3-642-27954-6_20",
language = "الإنجليزيّة",
isbn = "9783642279539",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "313--331",
booktitle = "Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings",
note = "12th Cryptographers' Track at the RSA Conference, CT-RSA 2012 ; Conference date: 27-02-2012 Through 02-03-2012",
}