Distributed Public-Key Cryptography from Weak Secrets

被引:0
作者
Abdalla, Michel [1 ]
Boyen, Xavier [2 ]
Chevalier, Celine [1 ]
Pointcheval, David [1 ]
机构
[1] CNRS, INRIA, Ecole Normale Super, Paris, France
[2] Stanford Univ, Stanford, CA 94305 USA
来源
PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS | 2009年 / 5443卷
关键词
SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that Our distributed protocols generalize to a broad class of "discrete-log"-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
引用
收藏
页码:139 / +
页数:4
相关论文
共 30 条
[1]  
[Anonymous], 2001, LNCS, DOI DOI 10.1007/3-540-44647-8
[2]  
[Anonymous], AN S FDN CO
[3]  
[Anonymous], ACM CCS 05
[4]  
[Anonymous], 2001, LNCS, DOI DOI 10.1007/3-540-44647-8
[5]  
[Anonymous], 1993, ACM CCS
[6]  
[Anonymous], 21 ACM PODC
[7]  
[Anonymous], 25 ACM PODC
[8]  
[Anonymous], 1989, Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC '89)
[9]  
[Anonymous], LECT NOTES COMPUTER
[10]  
Barak B, 2005, LECT NOTES COMPUT SC, V3621, P361