Adaptively secure distributed public-key systems

被引:3
|
作者
Frankel, Y
MacKenzie, P
Yung, M
机构
[1] Ecash Technol Inc, New York, NY USA
[2] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
关键词
D O I
10.1016/S0304-3975(01)00260-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When attacking a distributed protocol, an adaptive adversary is able to determine its actions (e.g., which parties to corrupt) at any time based on its entire view of the protocol including the entire communication history. Proving security of cryptographic protocols against adaptive adversaries is a fundamental problem in cryptography. In this paper, we consider distributed public-key systems which are secure against an adaptive adversary. Specifically, we construct distributed discrete-log-based and RSA-based public-key systems secure against an adaptive adversary. We also extend the discrete-log-based systems to have proactive security, that is, security against an (adaptive) mobile adversary that has an upper bound on the number of servers it may corrupt at any one time, but no upper bound on the number of servers it may corrupt over the lifetime of the system. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:535 / 561
页数:27
相关论文
共 50 条
  • [1] Adaptively-secure distributed public-key systems
    Frankel, Y
    MacKenzie, P
    Yung, M
    [J]. ALGORITHMS - ESA'99, 1999, 1643 : 4 - 27
  • [2] Adaptively-secure, non-interactive public-key encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 150 - 168
  • [3] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME
    GALIL, Z
    HABER, S
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15
  • [4] Efficient and secure public-key cryptosystems
    Takagi, T
    [J]. CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237
  • [5] PUBLIC-KEY SYSTEMS
    BRASSARD, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 20 - 39
  • [6] Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
    Raghunathan, Ananth
    Segev, Gil
    Vadhan, Salil
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 93 - 110
  • [7] On the Power of Public-Key Encryption in Secure Computation
    Mahmoody, Mohammad
    Maji, Hemanta K.
    Prabhakaran, Manoj
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264
  • [8] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    [J]. New Generation Computing, 2005, 23 : 259 - 275
  • [9] A Secure Public-key Image Authentication Plan
    YANG Qing
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 289 - 292
  • [10] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137