Distributed public-key cryptography from weak secrets


Autoria(s): Abdalla, Michel; Boyen, Xavier; Chevalier, Céline; Pointcheval, David
Data(s)

2009

Resumo

We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/69182/

Publicador

Springer Berlin Heidelberg

Relação

http://eprints.qut.edu.au/69182/1/Boyen_accepted_draft.pdf

http://link.springer.com/chapter/10.1007%2F978-3-642-00468-1_9

DOI:10.1007/978-3-642-00468-1_9

Abdalla, Michel , Boyen, Xavier, Chevalier, Céline , & Pointcheval, David (2009) Distributed public-key cryptography from weak secrets. Lecture Notes in Computer Science, 5443, pp. 139-159.

Direitos

Copyright 2009 Springer Berlin Heidelberg

Author's Pre-print: author can archive pre-print (ie pre-refereeing) Author's Post-print: author can archive post-print (ie final draft post-refereeing) Publisher's Version/PDF: author cannot archive publisher's version/PDF

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Data Encryption #Algorithm Analysis and Problem Complexity #Information security
Tipo

Journal Article