Adaptively secure forward-secure non-interactive threshold cryptosystems

被引:0
|
作者
Libert, Benoît [1 ]
Yung, Moti [2 ]
机构
[1] Université catholique de Louvain, ICTEAM Institute, Belgium
[2] Google Inc. and Columbia University, United States
关键词
Cryptography - Authentication - Electronic document identification systems - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (d ≤n) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than d servers maintains the scheme’s security. For about two decades, extensive study was dedicated to this subject, which created a number of notable results. So far, most practical threshold signatures, where servers act non-interactively, were analyzed in the limited static corruption model (where the adversary chooses which servers will be corrupted at the system’s initialization stage). Existing threshold encryption schemes that withstand the strongest combination of adaptive malicious corruptions (allowing the adversary to corrupt servers at any time based on its complete view), and chosenciphertext attacks (CCA) all require interaction (in the non-idealized model) and attempts to remedy this problem resulted only in relaxed schemes. The same is true for threshold signatures secure under chosen message attacks (CMA). It was open (for about 10 years) whether there are non-interactive threshold schemes providing the highest security (namely, CCA-secure encryption and CMA-secure signature) with scalable shares (i.e., as short as the original key) and adaptive security. This paper first surveys our ICALP 2011 work which answers this question affirmatively by presenting such efficient decryption and signature schemes within a unified algebraic framework. The paper then describes how to design on top of the surveyed system the first forward-secure non-interactive threshold cryptosystem with adaptive security. © Springer-Verlag Berlin Heidelberg 2012
引用
收藏
相关论文
共 50 条
  • [1] Adaptively Secure Non-interactive Threshold Cryptosystems
    Libert, Benoit
    Yung, Moti
    Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
  • [2] Adaptively secure non-interactive threshold cryptosystems
    Libert, Benoit
    Yung, Moti
    THEORETICAL COMPUTER SCIENCE, 2013, 478 : 76 - 100
  • [3] Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
    Libert, Benoit
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1405 - 1441
  • [4] Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
    Benoît Libert
    Moti Yung
    Journal of Cryptology, 2020, 33 : 1405 - 1441
  • [5] Non-Interactive Forward-Secure Threshold Signature without Random Oracles
    Yu, Jia
    Kong, Fan-Yu
    Zhao, Hua-Wei
    Cheng, Xiang-Guo
    Hao, Rong
    Guo, Xiang-Fa
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (03) : 571 - 586
  • [6] Non-interactive forward-secure threshold signature without random oracles
    College of Information Engineering, Qingdao University, Qingdao, 266071, China
    不详
    不详
    不详
    J. Inf. Sci. Eng., 3 (571-586):
  • [7] Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
    Libert, Benoit
    Yung, Moti
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 75 - 93
  • [8] HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
    Choudhary, Simran
    Gupta, Anil
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 34
  • [9] Efficient Forward-Secure Threshold Signatures
    Kurek, Rafael
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2020), 2020, 12231 : 239 - 260
  • [10] Forward-secure threshold signature schemes
    Abdalla, M
    Miner, S
    Namprempre, C
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 441 - 456