Robust and efficient sharing of RSA functions

被引:45
作者
Gennaro, R
Rabin, T
Jarecki, S
Krawczyk, H
机构
[1] IBM Corp, TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
[3] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
RSA signatures; threshold RSA; threshold cryptography;
D O I
10.1007/s001459910011
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present two efficient protocols which implement robust threshold RSA signature schemes, where the power to sign is shared by N players such that any subset of T + 1 or more signers can collaborate to produce a valid RSA signature on any given message, but no subset of T or less corrupted players can forge a signature. Our protocols are robust in the sense that the correct signature is computed even if up to T players behave in an arbitrarily malicious way during the signature protocol. This, in particular, includes the cases of players who refuse to participate or who introduce erroneous values into the computation. Our robust protocols achieve optimal resiliency as they can tolerate up to (N - 1)/2 faults, and their efficiency is comparable with the efficiency of the underlying threshold RSA signature scheme. Our protocols require RSA moduli which are the product of two safe primes, and that the underlying (centralized) RSA signature scheme is unforgeable. Our techniques also apply to the secure sharing of the RSA decryption function. We show that adding robustness to the existing threshold RSA schemes reduces to solving the problem of how to verify an RSA signature without a public verification exponent. Our technical contribution focuses on solving this problem Once a solution to this problem exists it can be applied to any existing threshold RSA signature scheme in order to achieve a robust threshold safe prime RSA signature scheme.
引用
收藏
页码:273 / 300
页数:28
相关论文
共 39 条
  • [1] Bellare M., 1995, LNCS, V950, P92, DOI [DOI 10.1007/BFB0053428, 10.1007/BFb0053428]
  • [2] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [3] Blum M., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P86, DOI 10.1145/73007.73015
  • [4] BONEH D, 1997, NOTES COMPUTER SCI, V1294, P425
  • [5] Boyar J., 1990, LECT NOTES COMPUTER, V537, P189, DOI DOI 10.1007/3-540-38424-3
  • [6] BOYD C, 1989, CRYPTOGRAPHY CODING, P241
  • [7] MINIMUM DISCLOSURE PROOFS OF KNOWLEDGE
    BRASSARD, G
    CHAUM, D
    CREPEAU, C
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1988, 37 (02) : 156 - 189
  • [8] CERECEDO M, 1993, IEICE T FUND ELECTR, VE76A, P532
  • [9] CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P212
  • [10] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214