Efficient generation of shared RSA keys

被引:76
作者
Boneh, D [1 ]
Franklin, M
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
security; multiparty computation; primality testing; RSA; threshold cryptography;
D O I
10.1145/502090.502094
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We describe efficient techniques for a number of parties to jointly generate an RSA key. At the end of the protocol an RSA modulus N = pq is publicly known. None of the parties know the factorization of N. In addition a public encryption exponent is publicly known and each party holds a share of the private exponent that enables threshold decryption. Our protocols are efficient in computation and communication. All results are presented in the honest but curious scenario (passive adversary).
引用
收藏
页码:702 / 722
页数:21
相关论文
共 41 条
[1]  
ALON N, 1995, LECT NOTES COMPUTER, V979, P523
[2]  
[Anonymous], 1999, LNCS, DOI DOI 10.1007/3-540-48405-1_8
[3]  
Bar-Ilan J., 1989, Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/72981.72995
[4]  
BEAVER DB, 1990, THESIS HARVARD U CAM
[5]  
Ben-Or Michael, 1988, P 20 ANN ACM S THEOR, P1, DOI DOI 10.1145/62212.62213
[6]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P237, DOI 10.1007/BFb0054866
[7]  
Catalano D, 2000, LECT NOTES COMPUT SC, V1807, P190
[8]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[9]  
COCKS C, 1997, LECT NOTES COMPUTER, V1423, P237
[10]  
COHEN JB, 1987, LECT NOTES COMPUTER, V263, P251