RSA Threshold Cryptography
نویسنده
چکیده
In this project, a new threshold signing scheme for RSA has been proposed. The scheme does not require a trusted third party and no secure information is leaked throughout the protocol. The time and storage complexity of the protocol is linear in the number of parties and no restriction is placed on the RSA moduli. Combined with the n-out-of-n key generation protocol of Boneh and Franklin, one has a complete solution for the threshold RSA problem with no trusted dealer. The complete protocol has also been implemented, a paper has been written and submitted to a conference on cryptography and coding.
منابع مشابه
RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs
A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and...
متن کاملGBD Threshold Cryptography with an Application to RSA Key Recovery
We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold decryption and threshold key generation are covered, in the “honest-butcurious” setting. This shows that it is possible to perform GBD computations in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar...
متن کاملGBD Threshold Cryptography with an Application to RSA Key Recovery
We present protocols for threshold decryption and threshold key generation in the GBD public-key cryptosystem in the “honest-butcurious” setting. These allow GBD computations to be performed in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar to El-Gamal threshold decryption. GBD threshold key gen...
متن کاملTowards providing a new lightweight authentication and encryption scheme for MANET
Mobile Ad hoc Network (MANET) is a wireless technology for mobile nodes. This network is setup on fly without any infrastructure. The mobility nature of this network and the lack of infrastructure make it very challenging to be secured. In this paper, we introduce a formal model for Identity-based RSA (Id-RSA) scheme proven secure in the random oracle model. The proposed scheme relies on establ...
متن کاملA Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication
In this paper we propose a threshold digital signature scheme by using RSA cryptography to authenticate multimedia content. Multimedia authentication deals with genuineness of the structure and content of the multimedia such as text, image, audio, video etc. The proposed scheme uses an efficient key distribution scenario where, the private key of the group is
متن کامل