Adaptively secure forward-secure non-interactive threshold cryptosystems

被引:0
|
作者
Libert, Benoît [1 ]
Yung, Moti [2 ]
机构
[1] Université catholique de Louvain, ICTEAM Institute, Belgium
[2] Google Inc. and Columbia University, United States
关键词
Cryptography - Authentication - Electronic document identification systems - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (d ≤n) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than d servers maintains the scheme’s security. For about two decades, extensive study was dedicated to this subject, which created a number of notable results. So far, most practical threshold signatures, where servers act non-interactively, were analyzed in the limited static corruption model (where the adversary chooses which servers will be corrupted at the system’s initialization stage). Existing threshold encryption schemes that withstand the strongest combination of adaptive malicious corruptions (allowing the adversary to corrupt servers at any time based on its complete view), and chosenciphertext attacks (CCA) all require interaction (in the non-idealized model) and attempts to remedy this problem resulted only in relaxed schemes. The same is true for threshold signatures secure under chosen message attacks (CMA). It was open (for about 10 years) whether there are non-interactive threshold schemes providing the highest security (namely, CCA-secure encryption and CMA-secure signature) with scalable shares (i.e., as short as the original key) and adaptive security. This paper first surveys our ICALP 2011 work which answers this question affirmatively by presenting such efficient decryption and signature schemes within a unified algebraic framework. The paper then describes how to design on top of the surveyed system the first forward-secure non-interactive threshold cryptosystem with adaptive security. © Springer-Verlag Berlin Heidelberg 2012
引用
收藏
相关论文
共 50 条
  • [31] A forward-secure signature with backward-secure detection
    Guan, D. J.
    Lin, Dai-Rui
    Wang, Chih-I
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 106 - 110
  • [32] A NEW FORWARD-SECURE THRESHOLD PROXY RE-SIGNATURE SCHEME
    Yang, Xiaodong
    Wang, Caifen
    Zhang, Yulei
    Wei, Weiyi
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 566 - 569
  • [33] Forward-Secure Encryption with Fast Forwarding
    Dodis, Yevgeniy
    Jost, Daniel
    Karthikeyan, Harish
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 3 - 32
  • [34] A NEW FORWARD-SECURE THRESHOLD SIGNATURE SCHEME FOR NETWORK AGRICULTURAL TRADE
    Feng, Xu
    Xin, Lv
    Jia, Likun
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (06): : 1231 - 1240
  • [35] A Forward-Secure Threshold Signature Scheme Based on Multiplicative Secret Sharing
    Lu Dian-jun
    Li Xin-yan
    Wang Yun
    Zhang Bing-ru
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 476 - +
  • [36] Forward-secure threshold signature scheme based on polynomial secret sharing
    Lu, Dian-Jun
    Zhang, Bing-Ru
    Zhao, Hai-Xing
    Tongxin Xuebao/Journal on Communication, 2009, 30 (01): : 45 - 49
  • [37] Secure Non-interactive Reduction and Spectral Analysis of Correlations
    Agarwal, Pratyush
    Narayanan, Varun
    Pathak, Shreya
    Prabhakaran, Manoj
    Prabhakaran, Vinod M.
    Rehan, Mohammad Ali
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 797 - 827
  • [38] A new forward-secure threshold signature scheme based on Schnorr cryptosystem
    Cheng, Guosheng
    Yun, Cuilan
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 599 - +
  • [39] Forward-Secure Linkable Ring Signatures
    Boyen, Xavier
    Haines, Thomas
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 245 - 264
  • [40] Forward-Secure Hierarchical Predicate Encryption
    Nieto, Juan Manuel Gonzalez
    Manulis, Mark
    Sun, Dongdong
    COMPUTER JOURNAL, 2014, 57 (04): : 510 - 536