GBD threshold cryptography with an application to RSA key recovery

ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy(2005)

引用 2|浏览0
暂无评分
摘要
We present protocols for threshold decryption and threshold key generation in the GBD public-key cryptosystem in the “honest-but-curious” setting. These allow GBD computations to be performed in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar to El-Gamal threshold decryption. GBD threshold key generation is based on adaptations of protocols for RSA key generation by Boneh and Franklin, and Catalano et al, and includes a new protocol for efficiently computing the inverse of a shared secret modulo another shared secret. We also show an application of GBD threshold cryptography to RSA key recovery, and point out two open problems in this application.
更多
查看译文
关键词
gbd threshold cryptography,key recovery,rsa key generation,key generation,el-gamal threshold decryption,private key,threshold key generation,threshold decryption,gbd threshold key generation,gbd threshold decryption
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要