Skip to main content

and
  1. Article

    Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first ...

    Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft in Journal of Cryptology (2019)