Distributed key generation protocol with hierarchical threshold access structure

نویسندگان

  • Nasrollah Pakniat
  • Mahnaz Noroozi
  • Ziba Eslami
چکیده

A distributed key generation (DKG) protocol is a central component in distributed cryptosystems. It allows a group of participants to jointly generate a pair of keys (private key and public key) without assuming any trusted participant. The public key is output in clear but only authorised subgroups of participants are able to reconstruct or use the private key. Existing literature on DKG protocols assumes equal authority for participants. In this study, the authors consider the problem of DKG in groups with hierarchical structure where the authorised subsets can be defined by a hierarchical threshold access structure. They first propose a verifiable hierarchical threshold secret sharing protocol. On the basis of this construction, they then propose a new DKG protocol with hierarchical threshold access structure for discrete-logarithm-based cryptosystems. It is shown that the proposed protocols satisfy all the security requirements.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DKG protocol in hierarchical threshold access structure

A distributed key generation (DKG) protocol is a central segment in distributed cryptosystems. It permits a gathering of members to mutually produce a pair of keys (private key and public key) without assuming any trusted member. The public key is output in clear but only authorised subgroups of members are able to reconstruct or utilize the private key. Existing study on DKG protocols assumes ...

متن کامل

Design Efficient Distributed Key Generation For Secure Network Applications over Cloud

Distributed key generation cryptosystems has a major content called distributed key generation (DKG) protocol. This protocol allows number of participants of group to generate a set of keys such as private key and public key without determining some trusted participants. Only authorized subgroups of participants are capable to regenerate or implement the private key and the public key is an out...

متن کامل

Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems

A Distributed Key Generation (DKG) protocol is an essential component of any threshold cryptosystem. It is used to initialize the cryptosystem and generate its private and public keys, and it is used as a subprotocol, for example to generate a one-time key pair which is a part of any threshold El-Gamal-like signature scheme. Gennaro et al. showed [GJKR99] that a widely-known non-interactive DKG...

متن کامل

Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares

Threshold cryptography increases security and resilience by sharing a private cryptographic key over different devices. Many personal devices, however, are not suited for threshold schemes, because they do not offer secure storage, which is needed to store shares of the private key. We present a solution that allows to include devices without them having to store their share. Shares are stored ...

متن کامل

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

Quality of service (QoS) based routing and scalability are two key features of multicast routing for the next generation Internetworks. This paper proposes a new protocol called QoS-aware hierarchical multicast routing protocol (QHMRP) that achieves scalability by organizing the network as a hierarchy of domains using the full-mesh aggregation technique. The protocol uses a novel reverse floodi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IET Information Security

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2015