Strong cryptography from weak secrets


Autoria(s): Boyen, Xavier; Chevalier, Céline; Fuchsbauer, Georg; Pointcheval, David
Data(s)

2010

Resumo

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/69180/

Publicador

Springer Berlin Heidelberg

Relação

http://eprints.qut.edu.au/69180/1/Boyen_accepted_draft.pdf

http://link.springer.com/chapter/10.1007%2F978-3-642-12678-9_18

DOI:10.1007/978-3-642-12678-9_18

Boyen, Xavier, Chevalier, Céline , Fuchsbauer, Georg, & Pointcheval, David (2010) Strong cryptography from weak secrets. Lecture Notes in Computer Science, 6055, pp. 297-315.

Direitos

Copyright 2010 Springer-Verlag Berlin Heidelberg

Author's Pre-print: author can archive pre-print (ie pre-refereeing) Author's Post-print: author can archive post-print (ie final draft post-refereeing) Publisher's Version/PDF: author cannot archive publisher's version/PDF

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Data Encryption #Systems and Data Security
Tipo

Journal Article