Strong cryptography from weak secrets
Data(s) |
2010
|
---|---|
Resumo |
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer Berlin Heidelberg |
Relação |
http://eprints.qut.edu.au/69180/1/Boyen_accepted_draft.pdf http://link.springer.com/chapter/10.1007%2F978-3-642-12678-9_18 DOI:10.1007/978-3-642-12678-9_18 Boyen, Xavier, Chevalier, Céline , Fuchsbauer, Georg, & Pointcheval, David (2010) Strong cryptography from weak secrets. Lecture Notes in Computer Science, 6055, pp. 297-315. |
Direitos |
Copyright 2010 Springer-Verlag Berlin Heidelberg Author's Pre-print: author can archive pre-print (ie pre-refereeing) Author's Post-print: author can archive post-print (ie final draft post-refereeing) Publisher's Version/PDF: author cannot archive publisher's version/PDF |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #Data Encryption #Systems and Data Security |
Tipo |
Journal Article |