Implementation and Discussion of Threshold RSA
نویسندگان
چکیده
A threshold cryptosystem involves collaboration among k of n users to take some cryptographic action. These actions could include encrypting, decrypting, signing and verifying. Threshold schemes are advantageous in situations where the involved parties wish to divide the power to sign or decrypt a message, so that no one party can take action without the support of some other parties, and in situations in which the parties wish to minimize the damage that a single compromised secret could cause. Such schemes are closely related to and often dependent on secretsharing protocols such as Shamir’s polynomial-based secret sharing scheme. When analyzing threshold cryptosystems, it’s important to consider factors such as interactivity, trusted third parties, amount of required re-computation, efficiency, and burden on outside users. For our project, we implemented Threshold RSA, a system that is a variant of standard RSA signatures and that enables a size-k subset of n parties to produce a valid RSA signature on a message. Our project contributes a Python implementation of the scheme as well as a discussion of its advantages, disadvantages and performance. We intended to further extend Threshold RSA to support anonymity and deniability, such that parties could not determine which k parties participated in producing the signature. However, we did not implement this extra feature due to time constants. 1 Overview of Threshold RSA In Threshold RSA, the RSA modulus N and public key e are publicly known. The two primes p and q, as well as the private key d are kept secret and are unknown to anyone. The parties engage in collaborative but untrusting protocols to generate additive shares, pi, qi and di, of the secrets. The protocols are collaborative because they requires parties to broadcast certain calculated values to other parties, and are untrusting because all parties can verify certain properties about the broadcast messages to ensure that other parties are honest. Threshold RSA has several desirable properties: • No trusted third party; no trusted central server • Distributed system; distributed computation can parallelize work for greater efficiency • A subset of fewer than k people cannot produce a valid RSA signature on a message • An attacker cannot use an existing signature to gain information about how to produce future signatures • Parties do not need to reshuffle or regenerate their secrets after each signature • Receivers of signatures produced by Threshold RSA can verify those signatures in the exact same manner as they would signatures produced by standard RSA; no extra work required One potential drawback of Threshold RSA is that the members of the size-k subset that collaborates to sign a message is known to the other parties. We imagined that this could lead to coercion, in the case that one party does not wish for the message to be signed, and therefore pressures or even threatens other parties to not sign, and is capable of knowing
منابع مشابه
RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs
A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and...
متن کاملUSENIX Association Proceedings of the 10 th USENIX Security Symposium
We present a new approach to fast certi cate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the RSA cryptosystem (mediated RSA) o ers a number of practical advantages over current revocation techniques. Our approach simpli es validation of digital signatures and enables certi cate revocation wi...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملAdaptively Secure Threshold Cryptography without the Assumption of Erasure
We exhibit eecient threshold cryptosystems which are secure against adaptive adversaries even when the players cannot erase their local data. Speciically, we present erasure-free adaptively-secure protocols for distributed decryption in Cramer-Shoup cryptosystem. Our techniques are also applicable for distributing the secret-key operation of other cryptosystems, like RSA, DSS, and ElGamal, as w...
متن کاملGBD Threshold Cryptography with an Application to RSA Key Recovery
We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold decryption and threshold key generation are covered, in the “honest-butcurious” setting. This shows that it is possible to perform GBD computations in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016