Proactive RSA
نویسندگان
چکیده
The notion of \proactive security" of basic primitives and cryptosystems has been introduced by Ostrovsky and Yung to deal with a very strong \mobile adversary" who may corrupt all participants (servers, each with private memory) throughout the lifetime of the system in a non-monotonic fashion (i.e. recoveries are possible), but who is not able to corrupt too many participants during any short period of time. The servers engage in a \proactive maintenance" that self-secures them against the mobile adversary that tries to learn the secret or disrupt their operation. We present a proactive RSA system in which a threshold of servers applies the RSA signature (or decryption) function in a distributed manner. Our protocol enables the dynamic updating of the servers (which hold the RSA key distributively); it is secure even when a linear number of the servers are corrupted during any time period (linear redundancy); it eeciently self-maintains the security of the function and its messages (ciphertexts or signatures); and it enables continuous availability, namely, correct function application using the shared key is possible at any time. The servers are able to eeciently self-secure the RSA key by changing its local representation, doing so without knowing the order ((N)) of the RSA multiplicative group Z N in which the global key maintenance protocol would naturally compute (where N is a multiple of two large primes). Instead, the servers compute and work with the shares as elements of the group of integers under addition. We present a way in which l servers can share an RSA key d so that: A gateway G can combine information from any set of (1 2 +)l (honest) servers to deduce M d for any authorized message M. Our protocol is secure against a polynomial time adversary who controls the gateway G and time-variant sets of up to (1 2 ?)l servers. The share-size is always bounded logarithmically in N .
منابع مشابه
Adaptive Security for the Additive-Sharing Based Proactive RSA
Adaptive security has recently been a very active area of research. In this paper we consider how to achieve adaptive security in the additive-sharing based proactive RSA protocol (from Crypto97). This protocol is the most efficient proactive RSA protocol for a constant number of shareholders, yet it is scalable, i.e., it provides reasonable asymptotic efficiency given certain constraints on th...
متن کاملAdaptively-Secure Optimal-Resilience Proactive RSA
When attacking a distributed protocol, an adaptive adversary may determine its actions (e.g., which parties to corrupt), at any time, based on its entire view of the protocol including the entire communication history. In this paper we are concerned with proactive RSA protocols, i.e., robust distributed RSA protocols that rerandomize key shares at certain intervals to reduce the threat of long-...
متن کاملSimplified Threshold RSA with Adaptive and Proactive Security
We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security of a proactive threshold signature scheme which was previously assumed to be only statically secure. As a s...
متن کاملAn Efficient Proactive RSA Scheme for Large-Scale Ad Hoc Networks
In this paper, we present an efficient proactive threshold RSA signature scheme for large-scale ad hoc networks. Our scheme has two advantages. Firstly, the building blocks of the whole scheme are proven secure. Secondly, the whole scheme is efficient.
متن کاملFurther Simplifications in Proactive RSA Signatures
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal threshold of t < n/2 corruptions. The new scheme offers a simpler alternative to the best previously known (static) proactive RSA scheme given by Tal Rabin [36], itself a simplification over the previous schemes given by Frankel et al. [18, 17]. The new scheme is conceptually simple because all the sh...
متن کاملOptimal Resilience Proactive Public-Key Cryptosystems
We introduce new eecient techniques for sharing cryptographic functions in a distributed dynamic fashion. These techniques dynamically and securely transform a distributed function (or secret sharing) representation between tout of -l (polynomial sharing) and tout of -t (additive sharing). We call the techniques poly-to-sum and sum-to-poly, respectively. Employing these techniques, we solve a n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 1996 شماره
صفحات -
تاریخ انتشار 1996