Adaptively secure distributed public-key systems

被引:3
|
作者
Frankel, Y
MacKenzie, P
Yung, M
机构
[1] Ecash Technol Inc, New York, NY USA
[2] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
关键词
D O I
10.1016/S0304-3975(01)00260-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When attacking a distributed protocol, an adaptive adversary is able to determine its actions (e.g., which parties to corrupt) at any time based on its entire view of the protocol including the entire communication history. Proving security of cryptographic protocols against adaptive adversaries is a fundamental problem in cryptography. In this paper, we consider distributed public-key systems which are secure against an adaptive adversary. Specifically, we construct distributed discrete-log-based and RSA-based public-key systems secure against an adaptive adversary. We also extend the discrete-log-based systems to have proactive security, that is, security against an (adaptive) mobile adversary that has an upper bound on the number of servers it may corrupt at any one time, but no upper bound on the number of servers it may corrupt over the lifetime of the system. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
下载
收藏
页码:535 / 561
页数:27
相关论文
共 50 条
  • [21] Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions
    Ananth Raghunathan
    Gil Segev
    Salil Vadhan
    Journal of Cryptology, 2018, 31 : 1012 - 1063
  • [22] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Junichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 107 - 113
  • [23] Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions
    Raghunathan, Ananth
    Segev, Gil
    Vadhan, Salil
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 1012 - 1063
  • [24] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Jun'ichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 707 - 711
  • [25] DLPKH - Distributed logical public-key hierarchy
    Bobba, Rakesh
    Khurana, Himanshu
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 110 - 127
  • [26] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [27] A SEMANTICALLY SECURE PUBLIC-KEY CRYPTOSYSTEM BASED ON RSA
    Romankov, V. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2015, 29 (03): : 32 - 40
  • [28] AN RSA BASED PUBLIC-KEY CRYPTOSYSTEM FOR SECURE COMMUNICATION
    VENKAIAH, VCH
    PROCEEDINGS OF THE INDIAN ACADEMY OF SCIENCES-MATHEMATICAL SCIENCES, 1992, 102 (02): : 147 - 153
  • [29] Multi-instance Secure Public-Key Encryption
    Brunetta, Carlo
    Heum, Hans
    Stam, Martijn
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 336 - 367
  • [30] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    Journal of Cryptology, 2007, 20 : 265 - 294