Practical RSA Threshold Decryption for Things That Think
نویسندگان
چکیده
Progressing towards an era of ever more small devices with computational power and storage capabilities, a new kind of security approach is needed. We propose a practical scheme to achieve threshold security for Things That Think. The private data of the user remains protected as long as the number of corrupted devices is lower than the threshold. We describe a procedure for key distribution, key redistribution, encryption and decryption. To show that our solution is feasible, we have implemented a proof of concept.
منابع مشابه
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a price in terms of efficiency, we do not want any compromise of the security assumptions that we make. Recently Shoup proposed a practical RSA threshold signature scheme that allows to share the ability to sign between a...
متن کاملGBD Threshold Cryptography with an Application to RSA Key Recovery
We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold decryption and threshold key generation are covered, in the “honest-butcurious” setting. This shows that it is possible to perform GBD computations in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar...
متن کاملGBD Threshold Cryptography with an Application to RSA Key Recovery
We present protocols for threshold decryption and threshold key generation in the GBD public-key cryptosystem in the “honest-butcurious” setting. These allow GBD computations to be performed in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar to El-Gamal threshold decryption. GBD threshold key gen...
متن کاملImplementation of Rsa Algorithm Using Elliptic Curve Algorithm for Security and Performance Enhancement
This paper introduces the concept and implementation of RSA algorithm for security purpose and to enhance the performance of software system using this algorithm. In this article we have done study about RSA algorithm. This study includes what is RSA algorithm and why they are used in the field of Cryptography & Network Security. After doing several works on this topic we came to conclude that ...
متن کاملTwo Party RSA Key Generation
We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key: a modulus N = PQ, and an encryption exponent e are known to both parties. Individually, neither party obtains information about the decryption key d and the prime factors of N : P and Q. However, d is shared among the parties so that threshold decryption is possible.
متن کامل