GBD threshold cryptography with an application to RSA key recovery

被引:0
|
作者
Steketee, C [1 ]
Brown, J
Nieto, JMG
Montague, P
机构
[1] Univ S Australia, Adv Comp Res Ctr, Adelaide, SA 5001, Australia
[2] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present protocols for threshold decryption and threshold key generation in the GBD public-key cryptosystem in the "honest-butcurious" setting. These allow GBD computations to be performed in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar to El-Gamal threshold decryption. GBD threshold key generation is based on adaptations of protocols for RSA key generation by Boneh and Franklin, and Catalano et al, and includes a new protocol for efficiently computing the inverse of a shared secret modulo another shared secret. We also show an application of GBD threshold cryptography to RSA key recovery, and point out two open problems in this application.
引用
收藏
页码:394 / 405
页数:12
相关论文
共 50 条
  • [1] Threshold key-recovery systems for RSA
    Okamoto, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 48 - 54
  • [2] RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication
    Retoliya, Rajkumari
    Soner, Swapnil
    Jain, Ati
    Tripathi, Anshu
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 624 - +
  • [3] Montgomery implantation of ECC over RSA on FPGA for Public Key Cryptography application
    Bhadada, Rajesh
    Sharma, Aditi
    [J]. PROCEEDINGS ON 2014 2ND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGY TRENDS IN ELECTRONICS, COMMUNICATION AND NETWORKING (ET2ECN), 2014,
  • [4] RSA Cryptography and Multi Prime RSA Cryptography
    Sani, Nur Atiqah Abdul
    Kamarulhaili, Hailiza
    [J]. PROCEEDINGS OF THE 24TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM24): MATHEMATICAL SCIENCES EXPLORATION FOR THE UNIVERSAL PRESERVATION, 2017, 1870
  • [5] RSA - A PUBLIC KEY CRYPTOGRAPHY SYSTEM .1.
    BURTON, CE
    [J]. DR DOBBS JOURNAL, 1984, 9 (03): : 16 - 22
  • [6] RSA - A PUBLIC KEY CRYPTOGRAPHY SYSTEM, .2.
    BURTON, CE
    [J]. DR DOBBS JOURNAL, 1984, 9 (04): : 32 - &
  • [7] Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography
    Thomas, Aswathi
    Manuel, Ebin M.
    [J]. INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 911 - 917
  • [8] On the Fog of RSA Key Lengths Verifying Public Key Cryptography Strength Recommendations
    Kiviharju, Mikko
    [J]. 2017 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2017,
  • [9] A teaching module on the history of public-key cryptography and RSA
    Jankvist, Uffe Thomas
    [J]. BSHM BULLETIN-JOURNAL OF THE BRITISH SOCIETY FOR THE HISTORY OF MATHEMATICS, 2008, 23 (03): : 157 - 168
  • [10] An Effective Efficiency Analysis of Random Key Cryptography over RSA
    Beniwal, Sonal
    Ekta
    Savita
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 267 - 271