A Distributed Shared Key Generation Procedure Using Fractional Keys

نویسندگان

  • R. Poovendran
  • M. S. Corson
  • J. S. Baras
چکیده

W e present a new class of distributed key generation and recovery algorithms suitable f o r group communication syst ems where the group membership is either static or slowly time-varying, and m u s t be tightly controlled. The proposed key generation approach allows entities which m a y have only partial trust in each other t o jointly generate a shared key without the aid of a n external third party. The shared key is generated using strong one-way function of the group parameter. This scheme also has perfect forward secrecy. The validity of key generation can be checked using verifiable secret sharing techniques. The key retrieval method does not require the keys t o be stored in a n external retrieval center. W e note that m a n y Internet-based applications m a y have these requirements. Fulfillment of these requirements is realized through the use of fractional keys-a distributed technique recently developed to enhance the security of distributed systems in a non-cryptographic manner.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Experimenting with Shared Generation of RSA Keys

We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved in the computation are convinced that N is a product of two large primes, however none of them know the factorization of N . In addition, a public encryption exponent is publicly known and each server holds a share of...

متن کامل

Shared Generation of Shared RSA Keys 1

The paper considers the problem of distributed key generation for shared-control RSA schemes. In particular: how can two parties generate a shared RSA key in such a way that neither party can cheat? The answer to this question would have signi cant applications to, for example, key escrow systems. Cocks has recently proposed protocols to solve this problem in the case when both parties act hone...

متن کامل

GBD Threshold Cryptography with an Application to RSA Key Recovery

We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold decryption and threshold key generation are covered, in the “honest-butcurious” setting. This shows that it is possible to perform GBD computations in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar...

متن کامل

GBD Threshold Cryptography with an Application to RSA Key Recovery

We present protocols for threshold decryption and threshold key generation in the GBD public-key cryptosystem in the “honest-butcurious” setting. These allow GBD computations to be performed in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar to El-Gamal threshold decryption. GBD threshold key gen...

متن کامل

A Secure Biometric Based Approach for Providing Security Services in Resource-aware Distributed Computing Environment

In recent years there is a need for a security infrastructure for our ubiquitous digital life without using Public key infrastructure and shared session key cryptography algorithms. Since the system scales up, the peer to peer approach is attractive to Distributed Computing Environment due to increase in large amount of resources. The resources in such environment possess different characterist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998