Proactive DSA application and implementation [electronic resource].
- Published
- Washington, D.C. : United States. Dept. of Energy, 1998.
Oak Ridge, Tenn. : Distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy. - Physical Description
- 19 pages : digital, PDF file
- Additional Creators
- Sandia National Laboratories, United States. Department of Energy, and United States. Department of Energy. Office of Scientific and Technical Information
Access Online
- Restrictions on Access
- Free-to-read Unrestricted online access
- Summary
- Data authentication as provided by digital signatures is a well known technique for verifying data sent via untrusted network links. Recent work has extended digital signatures to allow jointly generated signatures using threshold techniques. In addition, new proactive mechanisms have been developed to protect the joint private key over long periods of time and to allow each of the parties involved to verify the actions of the other parties. In this paper, the authors describe an application in which proactive digital signature techniques are a particularly valuable tool. They describe the proactive DSA protocol and discuss the underlying software tools that they found valuable in developing an implementation. Finally, the authors briefly describe the protocol and note difficulties they experienced and continue to experience in implementing this complex cryptographic protocol.
- Report Numbers
- E 1.99:sand--97-2939c
E 1.99: conf-980554--
conf-980554--
sand--97-2939c - Subject(s)
- Other Subject(s)
- Note
- Published through SciTech Connect.
05/03/1998.
"sand--97-2939c"
" conf-980554--"
"DE98001308"
"DP0102021"
Laboratories for the 21st century, San Francisco, CA (United States), 5-7 May 1998.
Draelos, T.; Hamilton, V.; Istrail, G. - Funding Information
- AC04-94AL85000
View MARC record | catkey: 14348666